close
1.

図書

図書
Michael Wiener (ed.)
出版情報: Berlin ; Tokyo : Springer, c1999  xii, 638 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1666
所蔵情報: loading…
目次情報: 続きを見る
Public-Key Cryptanalysis I
On the Security of RSA Padding / Jean-Sébastien Coron ; David Naccache ; Julien P. Stern
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization / Aviad Kipnis ; Adi Shamir
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications / Phong Nguyen ; Jacques Stern
Invited Lecture
Information-Theoretic Cryptography / Ueli Maurer
Secure Communication and Computation
Information Theoretically Secure Communication in the Limited Storage Space Model / Yonatan Aumann ; Michael O. Rabin
The All-or-Nothing Nature of Two-Party Secure Computation / Amos Beimel ; Tal Malkin ; Silvio Micali
Distributed Cryptography
Adaptive Security for Threshold Cryptosystems / Ran Canetti ; Rosario Gennaro ; Stanislaw Jarecki ; Hugo Krawczyk ; Tal Rabin
Two Party RSA Key Generation / Niv Gilboa
Robust Distributed Multiplication without Interaction / Masayuki Abe
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting / Berry Schoenmakers
Secret-Key Cryptography
Truncated Differentials and Skipjack / Lars R. Knudsen ; M.J.B. Robshaw ; David Wagner
Fast Correlation Attacks Based on Turbo Code Techniques / Thomas Johansson ; Fredrik Jönsson
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality / Subhamoy Maitra ; Palash Sarkar
Message Authentication Codes
UMAC: Fast and Secure Message Authentication / John Black ; Shai Halevi ; Ted Krovetz ; Phillip Rogaway
Square Hash: Fast Message Authentication via Optimized Universal Hash Functions / Mark Etzel ; Sarvar Patel ; Zulfikar Ramzan
Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions / Jee Hea An ; Mihir Bellare
Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier / Oded Goldreich
Public-Key Cryptanalysis II
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97
Weakness in Quaternion Signatures / Don Coppersmith
Cryptanalysis of "2R" Schemes / Ding-Feng Ye ; Kwok-Yan Lam ; Zong-Duo Dai
Traitor Tracing / Dan Boneh ; Glenn Durfee ; Nick Howgrave-Graham
An Efficient Public Key Traitor Tracing Scheme / Matthew Franklin
Dynamic Traitor Tracing / Amos Fiat ; Tamir Tassa
Efficient Methods for Integrating Traceability and Broadcast Encryption / Eli Gafni ; Jessica Staddon ; Yiqun Lisa Yin
Differential Power Analysis
Towards Sound Approaches to Counteract Power-Analysis Attacks / Paul Kocher ; Joshua Jaffe ; Benjamin Jun ; Suresh Chari ; Charanjit S. Jutla ; Josyula R. Rao ; Pankaj Rohatgi
Signature Schemes
Separability and Efficiency for Generic Group Signature Schemes / Jan Camenisch ; Markus Michels
A Forward-Secure Digital Signature Scheme / Sara K. Miner
Abuse-Free Optimistic Contract Signing / Juan A. Garay ; Markus Jakobsson ; Philip MacKenzie
Zero Knowledge
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK / Amit Sahai ; Salil Vadhan
On Concurrent Zero-Knowledge with Pre-processing / Giovanni Di Crescenzo ; Rafail Ostrovsky
Asymmetric Encryption
On the Security Properties of OAEP as an All-or-Nothing Transform / Victor Boyko
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
Secure Integration of Asymmetric and Symmetric Encryption Schemes / Eiichiro Fujisaki ; Tatsuaki Okamoto
Electronic Cash
Auditable, Anonymous Electronic Cash / Tomas Sander ; Amnon Ta-Shma
Protocols and Broadcasting
Oblivious Transfer with Adaptive Queries / Moni Naor ; Benny Pinkas
Compressing Cryptographic Resources / Yuval Ishai
Coding Constructions for Blacklisting Problems without Computational Assumptions / Ravi Kumar ; Sridhar Rajagopalan
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes / Radha Poovendran ; John S. Baras
Author Index
Public-Key Cryptanalysis I
On the Security of RSA Padding / Jean-Sébastien Coron ; David Naccache ; Julien P. Stern
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization / Aviad Kipnis ; Adi Shamir
2.

図書

図書
Burton S. Kaliski Jr. (ed.)
出版情報: Berlin ; Tokyo : Springer, c1997  xii, 537 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1294
所蔵情報: loading…
3.

図書

図書
Hugo Krawczyk (ed.)
出版情報: Berlin ; Tokyo : Springer, c1998  xii, 517 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1462
所蔵情報: loading…
4.

図書

図書
Neal Koblitz (ed.)
出版情報: Berlin ; Tokyo : Springer, c1996  xii, 415 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1109
所蔵情報: loading…
5.

図書

図書
Don Coppersmith (ed.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1995  xii, 465 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 963
所蔵情報: loading…
6.

図書

図書
J. Feigenbaum (ed.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1992  x, 484 p. ; 25 cm
シリーズ名: Lecture notes in computer science ; 576
所蔵情報: loading…
7.

図書

図書
A.J. Menezes, S.A. Vanstone, (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1991  xiii, 643 p. ; 25 cm
シリーズ名: Lecture notes in computer science ; 537
所蔵情報: loading…
8.

図書

図書
G. Brassard (ed.)
出版情報: Berlin ; New York : Springer-Verlag, c1990  xiii, 634 p. ; 25 cm
シリーズ名: Lecture notes in computer science ; 435
所蔵情報: loading…
9.

図書

図書
S. Goldwasser (ed.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1990  xi, 591 p. ; 25 cm
シリーズ名: Lecture notes in computer science ; 403
所蔵情報: loading…
10.

図書

図書
Ernest F. Brickell (ed.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1993  x, 593 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 740
所蔵情報: loading…
11.

図書

図書
Douglas R. Stinson (ed.)
出版情報: Berlin ; New York : Springer-Verlag, c1994  x, 491 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 773
所蔵情報: loading…
12.

図書

図書
Yvo G. Desmedt (ed.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1994  xii, 438 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 839
所蔵情報: loading…
13.

図書

図書
Kevin S. McCurley , Claus Dieter Ziegler (eds.)
出版情報: Berlin ; Tokyo : Springer, c1998  xix, 460 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1440
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Conference Contents / Part I:
CRYPTO '81 / Allen Gersho
EUROCRYPT '82 / Thomas Beth
CRYPTO '82 / David Chaum ; Ronald L. Rivest ; Alan T. Sherman
EUROCRYPT '83
CRYPTO '83
EUROCRYPT '84, Thomas Beth, Norbert Cot, and Ingemar Ingemarsson
CRYPTO '84 / G. R. Blakley
EUROCRYPT '85 / Franz Pichler
CRYPTO '85 / Hugh C. Williams
EUROCRYPT '86 / Ingemar Ingemarsson
CRYPTO '86 / A. M. Odlyzko
EUROCRYPT '87 / Wyn L. Price
CRYPTO '87 / Carl Pomerance
EUROCRYPT '88 / Christof G. Günther
CRYPTO '88 / Shafi Goldwasser
EUROCRYPT '89 / Jean-Jacques Quisquater ; Joos Vandewalle
CRYPTO '89 / Gilles Brassard
EUROCRYPT '90 / Ivan B. Damgard
CRYPTO '90 / Alfred J. Menezes ; Scott A. Vanstone
EUROCRYPT '91 / Donald W. Davies
CRYPTO '91 / Joan Feigenbaum
EUROCRYPT '92 / Rainer A. Rueppel
CRYPTO '92 / Ernest F. Brickell
EUROCRYPT '93 / Tor Helleseth
CRYPTO '93 / Douglas R. Stinson
EUROCRYPT '94 / Alfredo De Santis
CRYPTO '94 / Yvo Desmedt
EUROCRYPT '95 / Louis C. Guillou
CRYPTO '95 / Don Coppersmith
EUROCRYPT '96 / Ueli Maurer
CRYPTO '96 / Neal Koblitz
EUROCRYPT '97 / Walter Fumy
CRYPTO '97 / Burt Kaliski
Indices / Part II:
List of Program Committees
Author Index
Keyword Index
Foreword
Preface
Conference Contents / Part I:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼