HOME > 상세정보

상세정보

Progress in cryptology--VIETCRYPT 2006 : First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006 : revised selected papers

Progress in cryptology--VIETCRYPT 2006 : First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006 : revised selected papers

자료유형
단행본
개인저자
Nguyen, Phong, Q. (Phong Quang)
서명 / 저자사항
Progress in cryptology--VIETCRYPT 2006 : First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006 : revised selected papers / Phong Q. Nguyen (ed.).
발행사항
Berlin ;   New York :   Springer,   c2006.  
형태사항
xi, 384 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 4341
ISBN
9783540687993 (pbk. : alk. paper) 3540687998 (pbk. : alk. paper)
일반주기
Also issued online.
서지주기
Includes bibliographical references and index.
이용가능한 다른형태자료
Also issued online.  
일반주제명
Computer security -- Vietnam -- Congresses. Computer systems -- Access control -- Congresses. Cryptography -- Vietnam -- Congresses.
000 02268camuu2200493 a 4500
001 000045560840
005 20091123171621
008 061113s2006 gw a b 101 0 eng d
010 ▼a 2006938421
016 7 ▼a 982277245 ▼2 GyFmDB
020 ▼a 9783540687993 (pbk. : alk. paper)
020 ▼a 3540687998 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm78203520
035 ▼a (OCoLC)78203520
035 ▼a (KERIS)REF000013025207
040 ▼a OHX ▼c OHX ▼d CUS ▼d C$Q ▼d DLC ▼d 211009
042 ▼a lccopycat
043 ▼a a-vt---
050 0 0 ▼a QA76.9.A25 ▼b I55385 2006
072 7 ▼a QA ▼2 lcco
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I616p ▼c 1
111 2 ▼a International Conference on Cryptology in Vietnam ▼n (1st : ▼d 2006 : ▼c Hanoi, Vietnam)
245 1 0 ▼a Progress in cryptology--VIETCRYPT 2006 : ▼b First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006 : revised selected papers / ▼c Phong Q. Nguyen (ed.).
246 3 0 ▼a VIETCRYPT 2006
246 3 0 ▼a First International Conference on Cryptology in Vietnam
246 3 0 ▼a International Conference on Cryptology in Vietnam
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2006.
300 ▼a xi, 384 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 4341
490 1 ▼a LNCS sublibrary. SL 4, Security and cryptology
504 ▼a Includes bibliographical references and index.
530 ▼a Also issued online.
650 0 ▼a Computer security ▼z Vietnam ▼v Congresses.
650 0 ▼a Computer systems ▼x Access control ▼v Congresses.
650 0 ▼a Cryptography ▼z Vietnam ▼v Congresses.
700 1 ▼a Nguyen, Phong, Q. ▼q (Phong Quang)
830 0 ▼a Lecture notes in computer science ; ▼v 4341.
830 0 ▼a LNCS sublibrary. ▼n SL 4, ▼p Security and cryptology.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I616p 1 등록번호 121186667 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Signatures and Lightweight Cryptography.- Probabilistic Multivariate Cryptography.- Short 2-Move Undeniable Signatures.- Searching for Compact Algorithms: cgen.- Invited Talk.- On Pairing-Based Cryptosystems.- Pairing-Based Cryptography.- A New Signature Scheme Without Random Oracles from Bilinear Pairings.- Efficient Dynamic k-Times Anonymous Authentication.- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?.- Algorithmic Number Theory.- Factorization of Square-Free Integers with High Bits Known.- Scalar Multiplication on Koblitz Curves Using Double Bases.- Compressed Jacobian Coordinates for OEF.- Ring Signatures and Group Signatures.- On the Definition of Anonymity for Ring Signatures.- Escrowed Linkability of Ring Signatures and Its Applications.- Dynamic Fully Anonymous Short Group Signatures.- Hash Functions.- Formalizing Human Ignorance.- Discrete Logarithm Variants of VSH.- How to Construct Sufficient Conditions for Hash Functions.- Cryptanalysis.- Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.- On the Internal Structure of Alpha-MAC.- A Weak Key Class of XTEA for a Related-Key Rectangle Attack.- Key Agreement and Threshold Cryptography.- Deniable Group Key Agreement.- An Ideal and Robust Threshold RSA.- Towards Provably Secure Group Key Agreement Building on Group Theory.- Public-Key Encryption.- Universally Composable Identity-Based Encryption.- Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate.- Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.


정보제공 : Aladin

관련분야 신착자료

이창현 (2021)