Advances in Cryptology - ASIACRYPT 2009 (Record no. 93603)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05997nam a22006615i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-642-10366-7 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730191054.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 100301s2009 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783642103667 |
-- | 978-3-642-10366-7 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-642-10366-7 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Advances in Cryptology - ASIACRYPT 2009 |
Medium | [electronic resource] : |
Remainder of title | 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings / |
Statement of responsibility, etc. | edited by Mitsuri Matsui. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2009. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Berlin, Heidelberg : |
Name of producer, publisher, distributor, manufacturer | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2009. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIV, 722 p. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 5912 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent Attack on Block Ciphers -- Cascade Encryption Revisited -- Quantum and Post-Quantum -- Quantum-Secure Coin-Flipping and Applications -- On the Power of Two-Party Quantum Cryptography -- Security Bounds for the Design of Code-Based Cryptosystems -- Hash Functions I -- Rebound Attack on the Full Lane Compression Function -- Rebound Distinguishers: Results on the Full Whirlpool Compression Function -- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners -- The Intel AES Instructions Set and the SHA-3 Candidates -- Encryption Schemes -- Group Encryption: Non-interactive Realization in the Standard Model -- On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations -- Hierarchical Predicate Encryption for Inner-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation -- Secure Two-Party Computation Is Practical -- Secure Multi-party Computation Minimizing Online Rounds -- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols -- Cryptographic Protocols -- Non-malleable Statistically Hiding Commitment from Any One-Way Function -- Proofs of Storage from Homomorphic Identification Protocols -- Simple Adaptive Oblivious Transfer without Random Oracle -- Hash Functions II -- Improved Generic Algorithms for 3-Collisions -- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical -- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! -- Models and Frameworks I -- On the Analysis of Cryptographic Assumptions in the Generic Ring Model -- Zero Knowledge in the Random Oracle Model, Revisited -- A Framework for Universally Composable Non-committing BlindSignatures -- Cryptanalysis: Sqaure and Quadratic -- Cryptanalysis of the Square Cryptosystems -- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses -- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? -- Models and Frameworks II -- Security Notions and Generic Constructions for Client Puzzles -- Foundations of Non-malleable Hash and One-Way Functions -- Hash Functions III -- Improved Cryptanalysis of Skein -- Linearization Framework for Collision Attacks: Application to CubeHash and MD6 -- Preimages for Step-Reduced SHA-2 -- Lattice-Based -- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures -- Efficient Public Key Encryption Based on Ideal Lattices -- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices -- Side Channels -- PSS Is Secure against Random Fault Attacks -- Cache-Timing Template Attacks -- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions -- Signature Schemes with Bounded Leakage Resilience. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
9 (RLIN) | 1973 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science). |
9 (RLIN) | 9168 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer programming. |
9 (RLIN) | 4169 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Discrete mathematics. |
9 (RLIN) | 12873 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Algorithms. |
9 (RLIN) | 3390 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data structures (Computer science). |
9 (RLIN) | 8188 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information theory. |
9 (RLIN) | 14256 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer science |
General subdivision | Mathematics. |
9 (RLIN) | 3866 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptology. |
9 (RLIN) | 31769 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Programming Techniques. |
9 (RLIN) | 145067 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Discrete Mathematics. |
9 (RLIN) | 12873 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Algorithms. |
9 (RLIN) | 3390 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data Structures and Information Theory. |
9 (RLIN) | 31923 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Discrete Mathematics in Computer Science. |
9 (RLIN) | 31837 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Matsui, Mitsuri. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 145068 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 145069 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783642103650 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783642103674 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 5912 |
9 (RLIN) | 145070 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-642-10366-7">https://doi.org/10.1007/978-3-642-10366-7</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.