Coverart for item
The Resource Advances in Cryptology - ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, edited by Pil Joong Lee, (electronic resource)

Advances in Cryptology - ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, edited by Pil Joong Lee, (electronic resource)

Label
Advances in Cryptology - ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings
Title
Advances in Cryptology - ASIACRYPT 2004
Title remainder
10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings
Statement of responsibility
edited by Pil Joong Lee
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers’ names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers
Member of
Dewey number
005.82
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
qQLmYp1Nv5U
Image bit depth
0
Language note
English
LC call number
QA268
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • International Conference on the Theory and Application of Cryptology and Information Security
  • Lee, Pil Joong.
Series statement
Lecture Notes in Computer Science,
Series volume
3329
http://library.link/vocab/subjectName
  • Coding theory
  • Data encryption (Computer science)
  • Operating systems (Computers)
  • Computer software
  • Information Systems
  • Computer Communication Networks
  • Coding and Information Theory
  • Cryptology
  • Operating Systems
  • Algorithm Analysis and Problem Complexity
  • Management of Computing and Information Systems
  • Computer Communication Networks
Label
Advances in Cryptology - ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, edited by Pil Joong Lee, (electronic resource)
Instantiates
Publication
Note
Includes index
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Block Ciphers -- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds -- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC -- Eliminating Random Permutation Oracles in the Even-Mansour Cipher -- Public Key Encryption -- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles -- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding -- Invited Talk I -- Stream Ciphers: Dead or Alive? -- Number Theory and Algebra -- On the Generalized Linear Equivalence of Functions Over Finite Fields -- Sieving Using Bucket Sort -- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups -- Secure Computation -- Practical Two-Party Computation Based on the Conditional Gate -- Privacy in Non-private Environments -- Asynchronous Proactive Cryptosystems Without Agreement -- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes -- Hash Functions -- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions -- Higher Order Universal One-Way Hash Functions -- The MD2 Hash Function Is Not One-Way -- Key Management -- New Approaches to Password Authenticated Key Exchange Based on RSA -- Constant-Round Authenticated Group Key Exchange for Dynamic Groups -- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates -- Identification -- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices -- Secret Handshakes from CA-Oblivious Encryption -- k-Times Anonymous Authentication (Extended Abstract) -- XL-Algorithms -- The XL-Algorithm and a Conjecture from Commutative Algebra -- Comparison Between XL and Gröbner Basis Algorithms -- Digital Signatures -- Generic Homomorphic Undeniable Signatures -- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings -- Public Key Cryptanalysis -- On the Security of MOR Public Key Cryptosystem -- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice -- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes -- Invited Talk II -- Information Security in Korea IT839 Strategy -- Symmetric Key Cryptanalysis -- How Far Can We Go Beyond Linear Cryptanalysis? -- The Davies-Murphy Power Attack -- Time-Memory Trade-Off Attacks on Multiplications and T-Functions -- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0 -- Protocols -- On Provably Secure Time-Stamping Schemes -- Strong Conditional Oblivious Transfer and Computing on Intervals -- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge
Dimensions
unknown
Edition
1st ed. 2004.
Extent
1 online resource (XVI, 548 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540305392
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/b104116
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000212651
  • (DE-He213)978-3-540-30539-2
  • (SSID)ssj0000098383
  • (PQKBManifestationID)11120041
  • (PQKBTitleCode)TC0000098383
  • (PQKBWorkID)10133783
  • (PQKB)11127778
  • (MiAaPQ)EBC3088242
  • (EXLCZ)991000000000212651
Label
Advances in Cryptology - ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, edited by Pil Joong Lee, (electronic resource)
Publication
Note
Includes index
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Block Ciphers -- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds -- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC -- Eliminating Random Permutation Oracles in the Even-Mansour Cipher -- Public Key Encryption -- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles -- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding -- Invited Talk I -- Stream Ciphers: Dead or Alive? -- Number Theory and Algebra -- On the Generalized Linear Equivalence of Functions Over Finite Fields -- Sieving Using Bucket Sort -- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups -- Secure Computation -- Practical Two-Party Computation Based on the Conditional Gate -- Privacy in Non-private Environments -- Asynchronous Proactive Cryptosystems Without Agreement -- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes -- Hash Functions -- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions -- Higher Order Universal One-Way Hash Functions -- The MD2 Hash Function Is Not One-Way -- Key Management -- New Approaches to Password Authenticated Key Exchange Based on RSA -- Constant-Round Authenticated Group Key Exchange for Dynamic Groups -- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates -- Identification -- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices -- Secret Handshakes from CA-Oblivious Encryption -- k-Times Anonymous Authentication (Extended Abstract) -- XL-Algorithms -- The XL-Algorithm and a Conjecture from Commutative Algebra -- Comparison Between XL and Gröbner Basis Algorithms -- Digital Signatures -- Generic Homomorphic Undeniable Signatures -- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings -- Public Key Cryptanalysis -- On the Security of MOR Public Key Cryptosystem -- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice -- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes -- Invited Talk II -- Information Security in Korea IT839 Strategy -- Symmetric Key Cryptanalysis -- How Far Can We Go Beyond Linear Cryptanalysis? -- The Davies-Murphy Power Attack -- Time-Memory Trade-Off Attacks on Multiplications and T-Functions -- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0 -- Protocols -- On Provably Secure Time-Stamping Schemes -- Strong Conditional Oblivious Transfer and Computing on Intervals -- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge
Dimensions
unknown
Edition
1st ed. 2004.
Extent
1 online resource (XVI, 548 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540305392
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/b104116
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000212651
  • (DE-He213)978-3-540-30539-2
  • (SSID)ssj0000098383
  • (PQKBManifestationID)11120041
  • (PQKBTitleCode)TC0000098383
  • (PQKBWorkID)10133783
  • (PQKB)11127778
  • (MiAaPQ)EBC3088242
  • (EXLCZ)991000000000212651

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...