| 000 | 07750cam a2201141 a 4500 | ||
|---|---|---|---|
| 001 | ocn262693850 | ||
| 003 | OCoLC | ||
| 005 | 20250703145508.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 081017s2006 gw a ob 101 0 eng d | ||
| 040 |
_aGW5XE _beng _epn _cGW5XE _dGW5XE _dCEF _dGZM _dBAKER _dDAY _dNUI _dOCLCQ _dE7B _dOCLCQ _dA7U _dOCLCQ _dOCLCF _dBEDGE _dITD _dOCLCO _dCOO _dYDXCP _dIDEBK _dOCLCQ _dOCLCO _dOCL _dOCLCO _dOCLCQ _dEBLCP _dVT2 _dLVT _dOCLCA _dOCLCQ _dESU _dOCLCQ _dU3W _dBUF _dSTF _dUAB _dOCLCQ _dAU@ _dOCLCQ _dWYU _dICG _dYOU _dLEAUB _dOL$ _dOCLCQ _dAUD _dOCL _dWURST _dOCLCQ _dLUN _dUKAHL _dDCT _dOCLCO _dCOM _dOCLCO _dOCLCQ _dQGK _dCOA _dOCLCL _dOCLCO |
||
| 015 |
_a06,N33,0014 _2dnb |
||
| 016 | 7 |
_a980625076 _2DE-101 |
|
| 019 |
_a71843415 _a317881706 _a466344187 _a475981412 _a767221323 _a785778654 _a810006040 _a964912534 _a1005785869 _a1035691361 _a1044228194 _a1056379866 _a1066517783 _a1077264716 _a1081211442 _a1087233567 _a1100906250 _a1132299941 _a1162686723 _a1167365369 _a1204021920 _a1259160725 _a1262676053 _a1340050080 |
||
| 020 | _a9783540374336 | ||
| 020 | _a3540374337 | ||
| 020 | _a3540374329 | ||
| 020 | _a9783540374329 | ||
| 024 | 7 |
_a10.1007/11818175 _2doi |
|
| 024 | 8 | _a9786611388140 | |
| 024 | 8 | _a(WaSeSS)ssj0000315804 | |
| 028 | 5 | 2 | _a11818175 |
| 029 | 1 |
_aAU@ _b000042372617 |
|
| 029 | 1 |
_aAU@ _b000058158011 |
|
| 029 | 1 |
_aDKDLA _b820120-katalog:000461577 |
|
| 029 | 1 |
_aHEBIS _b192076779 |
|
| 029 | 1 |
_aNZ1 _b12055784 |
|
| 035 |
_a(OCoLC)262693850 _z(OCoLC)71843415 _z(OCoLC)317881706 _z(OCoLC)466344187 _z(OCoLC)475981412 _z(OCoLC)767221323 _z(OCoLC)785778654 _z(OCoLC)810006040 _z(OCoLC)964912534 _z(OCoLC)1005785869 _z(OCoLC)1035691361 _z(OCoLC)1044228194 _z(OCoLC)1056379866 _z(OCoLC)1066517783 _z(OCoLC)1077264716 _z(OCoLC)1081211442 _z(OCoLC)1087233567 _z(OCoLC)1100906250 _z(OCoLC)1132299941 _z(OCoLC)1162686723 _z(OCoLC)1167365369 _z(OCoLC)1204021920 _z(OCoLC)1259160725 _z(OCoLC)1262676053 _z(OCoLC)1340050080 |
||
| 037 |
_a978-3-540-37432-9 _bSpringer _nhttp://www.springerlink.com |
||
| 050 | 4 |
_aQA76.9.A25 _bC79 2006 |
|
| 072 | 7 |
_aQA _2lcco |
|
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _222 |
| 084 |
_aSS 4800 _2rvk |
||
| 084 |
_a004 _2sdnb |
||
| 084 |
_aDAT 465f _2stub |
||
| 049 | _aMAIN | ||
| 111 | 2 |
_aCRYPTO (Conference) _n(26th : _d2006 : _cSanta Barbara, Calif.) _930255 |
|
| 245 | 1 | 0 |
_aAdvances in cryptology - CRYPTO 2006 : _b26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006 : proceedings / _cCynthia Dwork (ed.). |
| 246 | 3 | 0 | _aCRYPTO 2006 |
| 246 | 3 | _aTwenty-sixth Annual International Cryptology Conference | |
| 246 | 3 | 0 | _aInternational Cryptology Conference |
| 260 |
_aBerlin ; _aNew York : _bSpringer, _c©2006. |
||
| 300 |
_a1 online resource (xiii, 619 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 | _atext file | ||
| 347 | _bPDF | ||
| 490 | 1 |
_aLecture notes in computer science ; _v4117 |
|
| 504 | _aIncludes bibliographical references and index. | ||
| 588 | 0 | _aPrint version record. | |
| 505 | 0 | _aRigorous Bounds on Cryptanalytic Time/Memory Tradeoffs -- On the Power of the Randomized Iterate -- Strengthening Digital Signatures Via Randomized Hashing -- Round-Optimal Composable Blind Signatures in the Common Reference String Model -- On Signatures of Knowledge -- Non-interactive Zaps and New Techniques for NIZK -- Rankin's Constant and Blockwise Lattice Reduction -- Lattice-Based Cryptography -- A Method for Making Password-Based Key Exchange Resilient to Server Compromise -- Mitigating Dictionary Attacks on Password-Protected Local Storage -- Rationality and Adversarial Behavior in Multi-party Computation -- When Random Sampling Preserves Privacy -- Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models -- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets -- On Forward-Secure Storage -- Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One -- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) -- Fast Algorithms for the Free Riders Problem in Broadcast Encryption -- The Number Field Sieve in the Medium Prime Case -- Inverting HFE Is Quasipolynomial -- Cryptanalysis of 2R? Schemes -- Receipt-Free Universally-Verifiable Voting with Everlasting Privacy -- Cryptographic Protocols for Electronic Voting -- Asymptotically Optimal Two-Round Perfectly Secure Message Transmission -- Random Selection with an Adversarial Majority -- Oblivious Transfer and Linear Functions -- On Expected Constant-Round Protocols for Byzantine Agreement -- Robust Multiparty Computation with Linear Communication Complexity -- On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation -- Scalable Secure Multiparty Computation -- Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields -- Automated Security Proofs with Sequences of Games -- On Robust Combiners for Private Information Retrieval and Other Primitives -- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions -- On the Higher Order Nonlinearities of Algebraic Immune Functions -- New Proofs for NMAC and HMAC: Security Without Collision-Resistance. | |
| 546 | _aEnglish. | ||
| 650 | 0 |
_aComputers _xAccess control _vCongresses. _915312 |
|
| 650 | 0 |
_aCryptography _vCongresses. _914592 |
|
| 650 | 6 |
_aCryptographie _vCongrès. _914593 |
|
| 650 | 6 |
_aOrdinateurs _xAccès _xContrôle _vCongrès. _920704 |
|
| 650 | 7 |
_aInformatique. _2eclas _914930 |
|
| 650 | 7 |
_aComputers _xAccess control _2fast _915313 |
|
| 650 | 7 |
_aCryptography _2fast |
|
| 653 | 0 | 0 | _acomputers |
| 653 | 0 | 0 | _asamenleving |
| 653 | 0 | 0 | _asociety |
| 653 | 0 | 0 | _awiskunde |
| 653 | 0 | 0 | _amathematics |
| 653 | 0 | 0 | _ainformatiesystemen |
| 653 | 0 | 0 | _ainformation systems |
| 653 | 0 | 0 | _acomputerwetenschappen |
| 653 | 0 | 0 | _acomputer sciences |
| 653 | 0 | 0 | _acomputernetwerken |
| 653 | 0 | 0 | _acomputer networks |
| 653 | 0 | 0 | _agegevensbeheer |
| 653 | 0 | 0 | _adata management |
| 653 | 0 | 0 | _aoperating systems |
| 653 | 1 | 0 | _aInformation and Communication Technology (General) |
| 653 | 1 | 0 | _aInformatie- en communicatietechnologie (algemeen) |
| 655 | 2 |
_aCongress _911670 |
|
| 655 | 7 |
_aproceedings (reports) _2aat |
|
| 655 | 7 |
_aConference papers and proceedings _2fast _96065 |
|
| 655 | 7 |
_aConference papers and proceedings. _2lcgft _96065 |
|
| 655 | 7 |
_aActes de congrès. _2rvmgf _9609890 |
|
| 700 | 1 |
_aDwork, Cynthia, _d1958- _1https://id.oclc.org/worldcat/entity/E39PBJtGYwkPh3FtWH9rkh3xXd _930257 |
|
| 710 | 2 |
_aInternational Association for Cryptologic Research. _1https://id.oclc.org/worldcat/entity/E39QH7JmpbRcrqM3VRhHCfmRCF _922404 |
|
| 758 |
_ihas work: _aAdvances in cryptology - CRYPTO 2006 (Text) _1https://id.oclc.org/worldcat/entity/E39PCFYYHDpVYWfCgtQbFXfkj3 _4https://id.oclc.org/worldcat/ontology/hasWork |
||
| 776 | 0 | 8 |
_iPrint version: _aCRYPTO (Conference) (26th : 2006 : Santa Barbara, Calif.). _tAdvances in cryptology - CRYPTO 2006. _dBerlin ; New York : Springer, ©2006 _z3540374329 _z9783540374329 _w(DLC) 2006930607 _w(OCoLC)71008348 |
| 830 | 0 |
_aLecture notes in computer science ; _v4117. |
|
| 856 | 4 | 0 | _uhttps://link.springer.com/10.1007/11818175 |
| 938 |
_aAskews and Holts Library Services _bASKH _nAH26902162 |
||
| 938 |
_aBaker & Taylor _bBKTY _c100.00 _d100.00 _i3540374329 _n0006930317 _sactive |
||
| 938 |
_aEBL - Ebook Library _bEBLB _nEBL3068051 |
||
| 938 |
_aebrary _bEBRY _nebr10530301 |
||
| 938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _ncis23798397 |
||
| 938 |
_aYBP Library Services _bYANK _n3554451 |
||
| 994 |
_a92 _bATIST |
||
| 999 |
_c637964 _d637964 |
||