000 02909 a2200385 4500
003 Nust
005 20221020141513.0
010 _a 2007298452
020 _a3540219358
020 _a9783540219354
035 _a(OCoLC)55200627
035 _a(OCoLC)ocm55200627
040 _cNust
082 0 4 _a005.82,CAC
245 1 0 _aAdvances in cryptology :
_bEUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings /
_cChristian Cachin, Jan Camenisch (eds.).
246 3 0 _aEUROCRYPT 2004
246 3 0 _aInternational Conference on the Theory and Applications of Cryptographic Techniques
260 _aBerlin ;
_aNew York :
_bSpringer,
_cc2004.
300 _axii, 628 p. :
_bill. ;
_c24 cm.
440 0 _aLecture notes in computer science,
_v3027
_926093
505 _aEfficient private matching and set intersection (Page-1), Positive results and techniques for obfuscation (Page-20), Secure computation of the k[superscript th]-ranked element (Page-40), Short signatures without random oracles (Page-56), Sequential aggregate signatures from trapdoor permutations (Page-74), On the key-uncertainty of quantum ciphers and the computational security of one-way quantum transmission (Page-91), The exact price for unconditionally secure asymmetric cryptography (Page-109), On genera ting the initial key in the bounded-storage model (Page-126), Practical large-scale distributed key generation(Page-138), Optimal communication complexity of generic multicast key distribution (Page-153), An uninstantiable random-oracle-model scheme for a hybrid-encryption problem (Page-171), Black-box composition does not imply adaptive security (Page-189), Chosen-ciphertext security from identity-based encryption (Page-207), Efficient selective-ID secure identity-based encryption without random oracles (Page-323), Construction of secure random curves of Genus 2 over prime fields (Page-239), Projective coordinates leak (Page-257), Security proofs for identity-based (Page-268) identification and signature schemes Concurrent signatures (Page-287).
650 0 _aComputers
_xAccess control
_96085
650 0 _aCryptographie
_9100981
650 0 _aCryptography
650 0 _aData transmission systems
_xSecurity measures
_9100137
650 0 _aDonn⥥s
_xTransmission
_xS⥣urit⥢ size=
_xMesures
_9101005
650 0 _aKryptologie
_zInterlaken <2004>.
_9101006
650 0 _aOrdinateurs
_xAccᥳ
_xContr㯬e
_9101007
700 1 _aCachin, Christian.
_9101008
700 1 _aCamenisch, Jan.
_9101009
856 4 1 _3Publisher description
_uhttp://www.loc.gov/catdir/enhancements/fy0818/2007298452-d.html
856 4 1 _3Table of contents
_uhttp://www.loc.gov/catdir/toc/fy0716/2007298452.html
856 4 1 _uhttp://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3027
942 _2ddc
_cBK
_k005.82,CAC
999 _c188729
_d188729