|
|
|
|
LEADER |
00000cam a2200000xa 4500 |
001 |
b8593379 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
081017s2005 gw a ob 101 0 eng d |
005 |
20240418142622.7 |
010 |
|
|
|z 2004117506
|
019 |
|
|
|a 58547753
|a 62861625
|a 150336013
|a 316694366
|a 613486192
|a 729901578
|a 739126716
|a 785779848
|a 964890913
|
020 |
|
|
|a 9783540305743
|
020 |
|
|
|a 3540305742
|
020 |
|
|
|a 3540243992
|
020 |
|
|
|a 9783540243991
|
035 |
|
|
|a (OCoLC)spr262677882
|
035 |
|
|
|a (OCoLC)262677882
|z (OCoLC)58547753
|z (OCoLC)62861625
|z (OCoLC)150336013
|z (OCoLC)316694366
|z (OCoLC)613486192
|z (OCoLC)729901578
|z (OCoLC)739126716
|z (OCoLC)785779848
|z (OCoLC)964890913
|
035 |
|
|
|a (OCoLC)262677882
|z (OCoLC)58547753
|z (OCoLC)62861625
|z (OCoLC)150336013
|z (OCoLC)316694366
|z (OCoLC)613486192
|z (OCoLC)729901578
|z (OCoLC)739126716
|z (OCoLC)785779848
|
037 |
|
|
|a spr10.1007/b105222
|
040 |
|
|
|a GW5XE
|b eng
|e pn
|c GW5XE
|d QCL
|d BAKER
|d N$T
|d YDXCP
|d UAB
|d OCLCQ
|d YNG
|d E7B
|d OCLCQ
|d OCLCF
|d OCLCO
|d BEDGE
|d OCLCO
|d IDEBK
|d NUI
|d OCLCQ
|d OCL
|d OCLCO
|d OCLCQ
|d EBLCP
|d VT2
|
049 |
|
|
|a GWRE
|
050 |
|
4 |
|a QA76.9.A25
|b C822 2005eb
|
111 |
2 |
|
|a Cryptographers' Track at RSA Conference
|d (2005 :
|c San Francisco, Calif.)
|
245 |
1 |
0 |
|a Topics in cryptology--CT-RSA 2005
|h [electronic resource] :
|b the cryptographers' track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005 : proceedings /
|c Alfred Menezes (ed.)
|
246 |
3 |
0 |
|a CT-RSA 2005.
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer,
|c ©2005.
|
300 |
|
|
|a 1 online resource (x, 383 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a computer
|b c
|2 rdamedia.
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier.
|
490 |
1 |
|
|a Lecture notes in computer science,
|x 0302-9743 ;
|v 3376.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Invited Talks -- Sub-linear Queries Statistical Databases: Privacy with Power -- Malicious Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinking Generator -- Public-Key Encryption -- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption -- A Generic Conversion with Optimal Redundancy -- Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 -- Signature Schemes -- Foundations of Group Signatures: The Case of Dynamic Groups -- Time-Selective Convertible Undeniable Signatures -- Design Principles -- On Tolerant Cryptographic Constructions -- Password-Based Protocols -- Simple Password-Based Encrypted Key Exchange Protocols -- Hard Bits of the Discrete Log with Applications to Password Authentication -- Proofs for Two-Server Password Authentication -- Design and Analysis of Password-Based Key Derivation Functions -- Pairings -- A New Two-Party Identity-Based Authenticated Key Agreement -- Accumulators from Bilinear Pairings and Applications -- Computing the Tate Pairing -- Fast and Proven Secure Blind Identity-Based Signcryption from Pairings -- Efficient and Secure Implementation -- A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box -- CryptoGraphics: Secret Key Cryptography Using Graphics Cards -- Side-Channel Leakage of Masked CMOS Gates -- New Minimal Weight Representations for Left-to-Right Window Methods.
|
588 |
0 |
|
|a Print version record.
|
650 |
|
0 |
|a Computer security
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008101458.
|
650 |
|
0 |
|a Cryptography
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008101157.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484.
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 (OCoLC)fst00884552.
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 (OCoLC)fst01423772.
|
700 |
1 |
|
|a Menezes, A. J.
|q (Alfred J.),
|d 1965-
|0 http://id.loc.gov/authorities/names/n91082082
|1 http://isni.org/isni/0000000108776637.
|
776 |
0 |
8 |
|i Print version:
|a Cryptographers' Track at RSA Conference (2005 : San Francisco, Calif.).
|t Topics in cryptology--CT-RSA 2005.
|d Berlin ; New York : Springer, ©2005
|z 3540243992
|z 9783540243991
|w (DLC) 2004117506
|w (OCoLC)57596973.
|
830 |
|
0 |
|a Lecture notes in computer science ;
|v 3376.
|0 http://id.loc.gov/authorities/names/n42015162.
|
856 |
4 |
0 |
|u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/b105222
|z Full Text (via Springer)
|
907 |
|
|
|a .b8593379x
|b 03-19-20
|c 05-25-16
|
998 |
|
|
|a web
|b 07-01-17
|c g
|d b
|e -
|f eng
|g gw
|h 0
|i 1
|
907 |
|
|
|a .b8593379x
|b 07-02-19
|c 05-25-16
|
944 |
|
|
|a MARS - RDA ENRICHED
|
907 |
|
|
|a .b8593379x
|b 01-17-18
|c 05-25-16
|
907 |
|
|
|a .b8593379x
|b 07-06-17
|c 05-25-16
|
907 |
|
|
|a .b8593379x
|b 05-23-17
|c 05-25-16
|
915 |
|
|
|a I
|
956 |
|
|
|a Springer e-books
|
956 |
|
|
|b Springer Nature - Springer Computer Science eBooks 2005 English International
|
999 |
f |
f |
|i f677ffce-a216-592d-ac47-a36d28eb164e
|s 2129f7b1-082f-5a4f-87e3-129a61ea5972
|
952 |
f |
f |
|p Can circulate
|a University of Colorado Boulder
|b Online
|c Online
|d Online
|e QA76.9.A25 C822 2005eb
|h Library of Congress classification
|i Ebooks, Prospector
|n 1
|