Cargando…

Advances in Cryptology - CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, Proceedings /

This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008. The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Wagner, David (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:Security and Cryptology ; 5157
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-540-85174-5
003 DE-He213
005 20220112194634.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 |a 9783540851745  |9 978-3-540-85174-5 
024 7 |a 10.1007/978-3-540-85174-5  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Advances in Cryptology - CRYPTO 2008  |h [electronic resource] :  |b 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, Proceedings /  |c edited by David Wagner. 
250 |a 1st ed. 2008. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2008. 
300 |a XIV, 594 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 5157 
505 0 |a Random Oracles -- The Random Oracle Model and the Ideal Cipher Model Are Equivalent -- Programmable Hash Functions and Their Applications -- Applications -- One-Time Programs -- Adaptive One-Way Functions and Applications -- Public-Key Crypto I -- Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys -- Improved Bounds on Security Reductions for Discrete Log Based Signatures -- Circular-Secure Encryption from Decision Diffie-Hellman -- Public-Key Locally-Decodable Codes -- Hash Functions I -- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms -- Cryptanalysis of the GOST Hash Function -- Preimages for Reduced SHA-0 and SHA-1 -- Cryptanalysis I -- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme -- Bug Attacks -- Multiparty Computation I -- Scalable Multiparty Computation with Nearly Optimal Work and Resilience -- Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations -- Cryptanalysis II -- Cryptanalysis of MinRank -- New State Recovery Attack on RC4 -- Public-Key Crypto II -- Dynamic Threshold Public-Key Encryption -- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles -- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles -- Communication Complexity in Algebraic Two-Party Protocols -- Hash Functions II -- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions -- Compression from Collisions, or Why CRHF Combiners Have a Long Output -- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers -- Distributed Private Data Analysis: Simultaneously Solving How and What -- New Efficient Attacks on Statistical Disclosure Control Mechanisms -- Multiparty Computation II -- Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries -- Collusion-Free Protocols in the Mediated Model -- Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs -- Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems -- A Framework for Efficient and Composable Oblivious Transfer -- Founding Cryptography on Oblivious Transfer - Efficiently. 
520 |a This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008. The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on random oracles, applications, public-key crypto, hash functions, cryptanalysis, multiparty computation, privacy, zero knowledge, and oblivious transfer. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Electronic data processing-Management. 
650 0 |a Computer networks . 
650 0 |a Data protection. 
650 0 |a Computers and civilization. 
650 0 |a Computer science-Mathematics. 
650 0 |a Discrete mathematics. 
650 1 4 |a Cryptology. 
650 2 4 |a IT Operations. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Computers and Society. 
650 2 4 |a Discrete Mathematics in Computer Science. 
700 1 |a Wagner, David.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783540852124 
776 0 8 |i Printed edition:  |z 9783540873457 
776 0 8 |i Printed edition:  |z 9783540851738 
830 0 |a Security and Cryptology ;  |v 5157 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-540-85174-5  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)