Borrow it
 African Studies Library
 Alumni Medical Library
 Astronomy Library
 Fineman and Pappas Law Libraries
 Frederick S. Pardee Management Library
 Howard Gotlieb Archival Research Center
 Mugar Memorial Library
 Music Library
 Pikering Educational Resources Library
 School of Theology Library
 Science & Engineering Library
 Stone Science Library
The Resource Advances in Cryptology — ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini, (electronic resource)
Advances in Cryptology — ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini, (electronic resource)
Resource Information
The item Advances in Cryptology — ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Advances in Cryptology — ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
 Summary
 This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994. Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms
 Language
 eng
 Extent
 XII, 431 pp.
 Contents

 Multifeature security through homomorphic encryption
 Multiplicative nonabelian sharing schemes and their application to threshold cryptography
 Lower bound on the size of shares of nonperfect secret sharing schemes
 On sharing many secrets
 Combinatorial interpretation of secret sharing schemes
 A correlation attack on the binary sequence generators with timevarying output function
 On the linear complexity of nonlinearly filtered PNsequences
 Intrinsic statistical weakness of keystream generators
 Semibent functions
 Structures of cryptographic functions with strong avalanche characteristics
 Formal verification of cryptographic protocols: A survey
 Efficient electronic money
 How to prevent buying of votes in computer elections
 Design and analysis of key exchange protocols via secure channel identification
 Zeroknowledge proofs of computational power in the shared string model
 Information security aspects of spread spectrum systems
 Combinatorial structure of Acodes with rfold security
 MetaMessage recovery and MetaBlind signature schemes based on the discrete logarithm problem and their applications
 A digital signature scheme based on linear errorcorrecting block codes
 Secure acceleration of DSS signatures using insecure server
 The magic words are squeamish ossifrage
 Cryptanalysis of multiple modes of operation
 Linear cryptanalysis of LOKI and s 2DES
 Collisions and inversions for Damgård's whole hash function
 Attacking the SL 2 hashing scheme
 Security of the center in key distribution schemes
 Incidence structures for key sharing
 A publickey cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms
 Higher radix nonrestoring modular multiplication algorithm and publickey LSI architecture with limited hardware resources
 Low exponent attack against elliptic curve RSA
 A unified Markov approach to differential and linear cryptanalysis
 How to strengthen DES using existing hardware
 Some cryptographic properties of exponential functions
 Factoring: The DNA solution
 Can one design a signature scheme based on errorcorrecting codes?
 DESV1: A variation of the Data Encryption Standard (DES)
 Isbn
 9783540492368
 Label
 Advances in Cryptology — ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings
 Title
 Advances in Cryptology — ASIACRYPT'94
 Title remainder
 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings
 Statement of responsibility
 edited by Josef Pieprzyk, Reihanah SafaviNaini
 Subject

 Combinatorics
 Computer science
 Computer science
 Coding theory
 Computer Science
 Computer Science
 Coding theory
 Coding theory
 Combinatorics
 Coding and Information Theory
 Electronic resources
 Computer Communication Networks
 Computer Science
 Computer science
 Data encryption (Computer science)
 Data Encryption
 Data encryption (Computer science)
 Language
 eng
 Summary
 This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994. Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms
 http://library.link/vocab/creatorName
 Pieprzyk, Josef
 Image bit depth
 0
 LC call number
 QA76.9.A25
 Literary form
 non fiction
 http://library.link/vocab/relatedWorkOrContributorName

 SafaviNaini, Reihanah.
 SpringerLink
 Series statement
 Lecture Notes in Computer Science,
 Series volume
 917
 http://library.link/vocab/subjectName

 Computer science
 Computer Communication Networks
 Data encryption (Computer science)
 Coding theory
 Combinatorics
 Computer Science
 Data Encryption
 Coding and Information Theory
 Combinatorics
 Computer Communication Networks
 Label
 Advances in Cryptology — ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 Multifeature security through homomorphic encryption  Multiplicative nonabelian sharing schemes and their application to threshold cryptography  Lower bound on the size of shares of nonperfect secret sharing schemes  On sharing many secrets  Combinatorial interpretation of secret sharing schemes  A correlation attack on the binary sequence generators with timevarying output function  On the linear complexity of nonlinearly filtered PNsequences  Intrinsic statistical weakness of keystream generators  Semibent functions  Structures of cryptographic functions with strong avalanche characteristics  Formal verification of cryptographic protocols: A survey  Efficient electronic money  How to prevent buying of votes in computer elections  Design and analysis of key exchange protocols via secure channel identification  Zeroknowledge proofs of computational power in the shared string model  Information security aspects of spread spectrum systems  Combinatorial structure of Acodes with rfold security  MetaMessage recovery and MetaBlind signature schemes based on the discrete logarithm problem and their applications  A digital signature scheme based on linear errorcorrecting block codes  Secure acceleration of DSS signatures using insecure server  The magic words are squeamish ossifrage  Cryptanalysis of multiple modes of operation  Linear cryptanalysis of LOKI and s 2DES  Collisions and inversions for Damgård's whole hash function  Attacking the SL 2 hashing scheme  Security of the center in key distribution schemes  Incidence structures for key sharing  A publickey cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms  Higher radix nonrestoring modular multiplication algorithm and publickey LSI architecture with limited hardware resources  Low exponent attack against elliptic curve RSA  A unified Markov approach to differential and linear cryptanalysis  How to strengthen DES using existing hardware  Some cryptographic properties of exponential functions  Factoring: The DNA solution  Can one design a signature scheme based on errorcorrecting codes?  DESV1: A variation of the Data Encryption Standard (DES)
 Dimensions
 unknown
 Extent
 XII, 431 pp.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783540492368
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/BFb0000419
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783540492368
 Label
 Advances in Cryptology — ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 Multifeature security through homomorphic encryption  Multiplicative nonabelian sharing schemes and their application to threshold cryptography  Lower bound on the size of shares of nonperfect secret sharing schemes  On sharing many secrets  Combinatorial interpretation of secret sharing schemes  A correlation attack on the binary sequence generators with timevarying output function  On the linear complexity of nonlinearly filtered PNsequences  Intrinsic statistical weakness of keystream generators  Semibent functions  Structures of cryptographic functions with strong avalanche characteristics  Formal verification of cryptographic protocols: A survey  Efficient electronic money  How to prevent buying of votes in computer elections  Design and analysis of key exchange protocols via secure channel identification  Zeroknowledge proofs of computational power in the shared string model  Information security aspects of spread spectrum systems  Combinatorial structure of Acodes with rfold security  MetaMessage recovery and MetaBlind signature schemes based on the discrete logarithm problem and their applications  A digital signature scheme based on linear errorcorrecting block codes  Secure acceleration of DSS signatures using insecure server  The magic words are squeamish ossifrage  Cryptanalysis of multiple modes of operation  Linear cryptanalysis of LOKI and s 2DES  Collisions and inversions for Damgård's whole hash function  Attacking the SL 2 hashing scheme  Security of the center in key distribution schemes  Incidence structures for key sharing  A publickey cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms  Higher radix nonrestoring modular multiplication algorithm and publickey LSI architecture with limited hardware resources  Low exponent attack against elliptic curve RSA  A unified Markov approach to differential and linear cryptanalysis  How to strengthen DES using existing hardware  Some cryptographic properties of exponential functions  Factoring: The DNA solution  Can one design a signature scheme based on errorcorrecting codes?  DESV1: A variation of the Data Encryption Standard (DES)
 Dimensions
 unknown
 Extent
 XII, 431 pp.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783540492368
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/BFb0000419
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783540492368
Subject
 Coding and Information Theory
 Coding theory
 Coding theory
 Coding theory
 Combinatorics
 Combinatorics
 Computer Communication Networks
 Computer Science
 Computer Science
 Computer Science
 Computer science
 Computer science
 Computer science
 Data Encryption
 Data encryption (Computer science)
 Data encryption (Computer science)
 Electronic resources
Member of
Library Locations

African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 71.108227


Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 71.105717

Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 71.107023

Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 71.099547

Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 71.108227


Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 71.108227

Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 71.101425

School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 71.107235

Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 71.102257

Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT944th/55HRZVLDZMU/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT944th/55HRZVLDZMU/">Advances in Cryptology — ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Advances in Cryptology — ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT944th/55HRZVLDZMU/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT944th/55HRZVLDZMU/">Advances in Cryptology — ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>