Wonder Club world wonders pyramid logo
×

Advances in Cryptology - ASIACRYPT '96, Vol. 116 Book

Advances in Cryptology - ASIACRYPT '96, Vol. 116
Advances in Cryptology - ASIACRYPT '96, Vol. 116, This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.
The 31 revised full papers presente, Advances in Cryptology - ASIACRYPT '96, Vol. 116 has a rating of 5 stars
   2 Ratings
X
Advances in Cryptology - ASIACRYPT '96, Vol. 116, This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presente, Advances in Cryptology - ASIACRYPT '96, Vol. 116
5 out of 5 stars based on 2 reviews
5
100 %
4
0 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Advances in Cryptology - ASIACRYPT '96, Vol. 116
  • Written by author Kwangjo Kim
  • Published by Springer-Verlag New York, LLC, November 2007
  • This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presente
  • This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.The 31 revised full papers presented
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves1
Cryptographic Protocols Based on Real-Quadratic A-Fields15
Minding your p's and q's26
Authenticated Multi-Party Key Agreement36
Cryptography and the Internet : Lessons and Challenges50
Generating Standard DSA Signatures Without Long Inversion57
A Fast Software Implementation for Arithmetic Operations in GF(2[superscript n])65
Hash Functions Based on Block Ciphers and Quaternary Codes77
Generalized Feistel Networks91
On Applying Linear Cryptanalysis to IDEA105
A Multi-Recastable Ticket Scheme for Electronic Elections116
Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme125
Observations on Non-repudiation133
On the Efficiency of One-Time Digital Signatures145
A Hidden Cryptographic Assumption in No-Transferable Identification Schemes159
Electronic Money and Key Management from Global and Regional Points of View173
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification185
Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible196
Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main Channel210
Generalization of Higher Order SAC to Vector Output Boolean Functions218
On the Correlation Immune Functions and Their Nonlinearity232
How to Date Blind Signatures244
Provably Secure Blind Signature Schemes252
Cost-Effective Payment Schemes with Privacy Regulation266
Mis-representation of Identities in E-Cash Schemes and How to Prevent It276
"Indirect Discourse Proofs": Achieving Efficient Fair Off-Line E-cash286
The Validation of Cryptographic Algorithms301
Convertible Group Signatures311
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem322
On the Risk of Disruption in Several Multiparty Signature Schemes334
Correlation Attacks on Cascades of Clock Controlled Shift Registers346
Conditional Correlation Attack on Nonlinear Filter Generators360
The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes368
A World Wide Number Field Sieve Factoring Record: on to 512 Bits382
Author Index395


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Advances in Cryptology - ASIACRYPT '96, Vol. 116, This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.
The 31 revised full papers presente, Advances in Cryptology - ASIACRYPT '96, Vol. 116

X
WonderClub Home

This item is in your Collection

Advances in Cryptology - ASIACRYPT '96, Vol. 116, This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.
The 31 revised full papers presente, Advances in Cryptology - ASIACRYPT '96, Vol. 116

Advances in Cryptology - ASIACRYPT '96, Vol. 116

X
WonderClub Home

This Item is in Your Inventory

Advances in Cryptology - ASIACRYPT '96, Vol. 116, This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.
The 31 revised full papers presente, Advances in Cryptology - ASIACRYPT '96, Vol. 116

Advances in Cryptology - ASIACRYPT '96, Vol. 116

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: