000 03545nam a22005295i 4500
001 978-3-540-49162-0
003 DE-He213
005 20160624102040.0
007 cr nn 008mamaa
008 121227s1999 gw | s |||| 0|eng d
020 _a9783540491620
_9978-3-540-49162-0
024 7 _a10.1007/3-540-49162-7
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
245 1 0 _aPublic Key Cryptography
_h[electronic resource] :
_bSecond International Workshop on Practice and Theory in Public Key Cryptography, PKC’99 Kamakura, Japan, March 1–3, 1999 Proceedings.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1999.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1999.
300 _aX, 334 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1560
505 0 _aA New Type of “Magic Ink” Signatures — Towards Transcript-Irrelevant Anonymity Revocation -- A New Aspect of Dual Basis for Efficient Field Arithmetic -- On the Security of Random Sources -- Anonymous Fingerprinting Based on Committed Oblivious Transfer -- How to Enhance the Security of Public-Key Encryption at Minimum Cost -- Encrypted Message Authentication by Firewalls -- A Relationship between One-Wayness and Correlation Intractability -- Message Recovery Fair Blind Signature -- On Quorum Controlled Asymmetric Proxy Re-encryption -- Mini-Cash: A Minimalistic Approach to E-Commerce -- Preserving Privacy in Distributed Delegation with Fast Certificates -- Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol -- Toward Fair International Key Escrow -- How to Copyright a Function? -- On the Security of RSA Screening -- The Effectiveness of Lattice Attacks Against Low-Exponent RSA -- A Trapdoor Permutation Equivalent to Factoring -- Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor -- Evaluating Differential Fault Analysis of Unknown Cryptosystems -- Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project -- Hash Functions and the MAC Using All-or-Nothing Property -- Decision Oracles are Equivalent to Matching Oracles -- Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA’s Secret -- Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy -- A Secure Pay-per-View Scheme for Web-Based Video Service.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aOperating systems (Computers).
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aComputer Communication Networks.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aOperating Systems.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540656449
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1560
856 4 0 _uhttp://dx.doi.org/10.1007/3-540-49162-7
942 _2EBK6679
_cEBK
999 _c35973
_d35973