Advances in Cryptology — CRYPTO’ 93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings
This volume contains the papers presented at the CRYPTO '93 conference. The conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom) and held in cooperation with the IEEE Computer Society. These proce...
Gespeichert in:
| 1. Verfasser: | |
|---|---|
| Dokumenttyp: | Konferenzschrift |
| Sprache: | Englisch |
| Veröffentlicht: |
Berlin, Heidelberg
Springer-Verlag Berlin Heidelberg
1994
|
| Schriftenreihe: | Lecture notes in computer science
773 |
| In: |
Lecture notes in computer science (773)
|
| Volumes / Articles: | Show Volumes / Articles. |
| DOI: | 10.1007/3-540-48329-2 |
| Schlagworte: | |
| Online-Zugang: | Verlag, lizenzpflichtig, Volltext: https://doi.org/10.1007/3-540-48329-2 Resolving-System, lizenzpflichtig, Volltext: http://dx.doi.org/10.1007/3-540-48329-2 Cover: https://swbplus.bsz-bw.de/bsz322906512cov.jpg Verlag, Zentralblatt MATH, Inhaltstext: https://zbmath.org/?q=an:0856.00053 |
| Verfasserangaben: | edited by Douglas R. Stinson |
MARC
| LEADER | 00000cam a22000002c 4500 | ||
|---|---|---|---|
| 001 | 1649304943 | ||
| 003 | DE-627 | ||
| 005 | 20250515182532.0 | ||
| 007 | cr uuu---uuuuu | ||
| 008 | 100510s1994 gw |||||o 00| ||eng c | ||
| 020 | |a 9783540483298 |9 978-3-540-48329-8 | ||
| 024 | 7 | |a 10.1007/3-540-48329-2 |2 doi | |
| 035 | |a (DE-627)1649304943 | ||
| 035 | |a (DE-576)322906512 | ||
| 035 | |a (DE-599)BSZ322906512 | ||
| 035 | |a (OCoLC)833783841 | ||
| 035 | |a (OCoLC)699834350 | ||
| 035 | |a (DE-601)NLM00369402X | ||
| 035 | |a (DE-He213)978-3-540-48329-8 | ||
| 035 | |a (DE-627-1)040491706 | ||
| 035 | |a (ZBM)0856.00053 | ||
| 040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
| 041 | |a eng | ||
| 044 | |c XA-DE-BE |c XA-DE |c XD-US |c XA-GB | ||
| 050 | 0 | |a QA76.9.A25 | |
| 072 | 7 | |a GPJ |2 bicssc | |
| 072 | 7 | |a URY |2 bicssc | |
| 072 | 7 | |a COM053000 |2 bisacsh | |
| 082 | 0 | |a 005.82 |2 23 | |
| 082 | 0 | |a 005.824 |2 23 | |
| 082 | 0 | |a 005.8/2 | |
| 084 | |a 28 |2 sdnb | ||
| 084 | |a 27 |2 sdnb | ||
| 084 | |a 28 |2 sdnb | ||
| 084 | |a 28 |2 sdnb | ||
| 084 | |a ST 276 |2 rvk |0 (DE-625)rvk/143642: | ||
| 084 | |a SK 170 |2 rvk |0 (DE-625)rvk/143221: | ||
| 084 | |a *00B25 |2 msc | ||
| 084 | |a 94-06 |2 msc | ||
| 084 | |a 68-06 |2 msc | ||
| 084 | |a 94A60 |2 msc | ||
| 084 | |a 53.71 |2 bkl | ||
| 084 | |a 54.38 |2 bkl | ||
| 084 | |a 54.62 |2 bkl | ||
| 100 | 1 | |a Stinson, Douglas R. |d 1956- |0 (DE-588)124658814 |0 (DE-627)521524008 |0 (DE-576)171903080 |4 aut | |
| 245 | 1 | 0 | |a Advances in Cryptology — CRYPTO’ 93 |b 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings |c edited by Douglas R. Stinson |
| 264 | 1 | |a Berlin, Heidelberg |b Springer-Verlag Berlin Heidelberg |c 1994 | |
| 300 | |a Online-Ressource | ||
| 336 | |a Text |b txt |2 rdacontent | ||
| 337 | |a Computermedien |b c |2 rdamedia | ||
| 338 | |a Online-Ressource |b cr |2 rdacarrier | ||
| 490 | 1 | |a Lecture Notes in Computer Science |v 773 | |
| 490 | 0 | |a SpringerLink |a Bücher | |
| 500 | |a Literaturangaben | ||
| 520 | |a This volume contains the papers presented at the CRYPTO '93 conference. The conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom) and held in cooperation with the IEEE Computer Society. These proceedings contain revised versions of the 38 contributed talks, as well as two talks from the rump session. The papers are grouped into parts on: cryptosystems, stream ciphers and cryptographic functions, proof systems and zero-knowledge, secret sharing, number theory and algorithms, differential cryptanalysis, complexity theory, applications, authentication codes, hash functions, cryptanalysis, and key distribution | ||
| 650 | 0 | |a Computer Science | |
| 650 | 0 | |a Computer science | |
| 650 | 0 | |a Combinatorics | |
| 650 | 0 | |a Information theory. | |
| 650 | 0 | |a Discrete mathematics. | |
| 650 | 0 | |a Cryptography. | |
| 650 | 0 | |a Coding theory | |
| 650 | 0 | |a Data encryption (Computer science) | |
| 650 | 0 | |a Operating systems (Computers) | |
| 655 | 7 | |a Konferenzschrift |y 1993 |z Santa Barbara, Calif. |0 (DE-588)1071861417 |0 (DE-627)826484824 |0 (DE-576)433375485 |2 gnd-content | |
| 655 | 7 | |a Konferenzschrift |0 (DE-588)1071861417 |0 (DE-627)826484824 |0 (DE-576)433375485 |2 gnd-content | |
| 689 | 0 | 0 | |d s |0 (DE-588)4033329-2 |0 (DE-627)106257862 |0 (DE-576)209001321 |a Kryptologie |2 gnd |
| 689 | 0 | |5 (DE-627) | |
| 689 | 1 | 0 | |d s |0 (DE-588)4033329-2 |0 (DE-627)106257862 |0 (DE-576)209001321 |a Kryptologie |2 gnd |
| 689 | 1 | |5 (DE-627) | |
| 689 | 2 | 0 | |d s |0 (DE-588)4033329-2 |0 (DE-627)106257862 |0 (DE-576)209001321 |a Kryptologie |2 gnd |
| 689 | 2 | |5 (DE-627) | |
| 689 | 3 | 0 | |d s |0 (DE-588)4033329-2 |0 (DE-627)106257862 |0 (DE-576)209001321 |a Kryptologie |2 gnd |
| 689 | 3 | |5 (DE-627) | |
| 776 | 1 | |z 9783540577669 | |
| 776 | 0 | 8 | |i Buchausg. u.d.T. |t Advances in cryptology |d Berlin : Springer, 1994 |h X, 491 S. |w (DE-627)272026565 |w (DE-576)037976419 |z 3540577661 |z 0387577661 |
| 830 | 0 | |a Lecture notes in computer science |v 773 |9 773 |w (DE-627)316228877 |w (DE-576)093890923 |w (DE-600)2018930-8 |x 1611-3349 |7 am | |
| 856 | 4 | 0 | |u https://doi.org/10.1007/3-540-48329-2 |m X:SPRINGER |x Verlag |z lizenzpflichtig |3 Volltext |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1007/3-540-48329-2 |x Resolving-System |z lizenzpflichtig |3 Volltext |
| 856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz322906512cov.jpg |m V:DE-576 |m X:springer |q image/jpeg |v 20150317120244 |3 Cover |
| 856 | 4 | 2 | |u https://zbmath.org/?q=an:0856.00053 |m B:ZBM |v 2021-04-12 |x Verlag |y Zentralblatt MATH |3 Inhaltstext |
| 889 | |w (DE-576)9332909067 | ||
| 889 | |w (DE-627)749231440 | ||
| 889 | |w (DE-627)332909069 | ||
| 912 | |a ZDB-1-SLN | ||
| 912 | |a ZDB-2-LNC |b 1994 | ||
| 912 | |a ZDB-2-SCS |b 1994 | ||
| 912 | |a ZDB-2-BAE |b 1994 | ||
| 912 | |a ZDB-2-SXCS |b 1994 | ||
| 912 | |a ZDB-2-SEB |b 1994 | ||
| 912 | |a GBV-SPRINGER-LNCS | ||
| 935 | |h GBV |i ExPruef | ||
| 936 | r | v | |a ST 276 |b Datensicherung (physik.) und angewandte Kryptographie, Computerviren |k Informatik |k Monografien |k Software und -entwicklung |k Datensicherung (physik.) und angewandte Kryptographie, Computerviren |0 (DE-627)127148207X |0 (DE-625)rvk/143642: |0 (DE-576)20148207X |
| 936 | r | v | |a SK 170 |b Kombinatorik (klassisch) |k Mathematik |k Monografien |k Kombinatorik (klassisch) |0 (DE-627)1271156180 |0 (DE-625)rvk/143221: |0 (DE-576)201156180 |
| 936 | r | u | |a SS 4800 |b Lecture notes in computer science |k Lecture notes in computer science |0 (DE-627)1271461242 |0 (DE-625)rvk/143528: |0 (DE-576)201461242 |z Ungueltig |
| 936 | r | u | |a SS 1993 |b Veranstaltungsjahr 1993 |k Veranstaltungsjahr 1993 |0 (DE-627)1271749173 |0 (DE-625)rvk/143430: |0 (DE-576)201749173 |z Ungueltig |
| 936 | b | k | |a 53.71 |j Theoretische Nachrichtentechnik |q SEPA |0 (DE-627)10641870X |
| 936 | b | k | |a 54.38 |j Computersicherheit |q SEPA |0 (DE-627)106418866 |
| 936 | b | k | |a 54.62 |j Datenstrukturen |q SEPA |0 (DE-627)106403265 |
| 951 | |a BO | ||
| 990 | |a Kryptologie | ||
| 990 | |a Kryptologie | ||
| 990 | |a Kryptologie | ||
| 990 | |a Kryptologie | ||
| 992 | |a 20230605 | ||
| 999 | |a KXP-PPN1649304943 |e 4329364034 | ||
| BIB | |a Y | ||
| SPR | |a Y | ||
| JSO | |a {"type":{"bibl":"book","media":"Online-Ressource"},"note":["Literaturangaben"],"physDesc":[{"extent":"Online-Ressource"}],"recId":"1649304943","language":["eng"],"relMultPart":[{"type":{"media":"Online-Ressource","bibl":"serial"},"disp":"Lecture Notes in Computer Science","note":["Gesehen am 28.02.20","Das Gesamtwerk gliedert sich in: Lecture notes in artificial intelligence; Lecture notes in bioinformatics"],"language":["eng"],"recId":"316228877","pubHistory":["1.1973 -"],"titleAlt":[{"title":"LNCS online"},{"title":"LNAI"},{"title":"Lecture notes in artificial intelligence"},{"title":"Lecture notes in bioinformatics"},{"title":"LNAI"},{"title":"LNBI"},{"title":"LNCS-LNAI"},{"title":"LNCS-LNBI"}],"part":{"number_sort":["773"],"number":["773"]},"title":[{"title_sort":"Lecture notes in computer science","title":"Lecture notes in computer science"}],"physDesc":[{"extent":"Online-Ressource"}],"dispAlt":"Lecture notes in computer science","origin":[{"dateIssuedDisp":"1973-","publisher":"Springer","dateIssuedKey":"1973","publisherPlace":"Berlin ; Heidelberg"}],"id":{"zdb":["2018930-8"],"eki":["316228877"],"issn":["1611-3349"]}}],"person":[{"given":"Douglas R.","family":"Stinson","role":"aut","display":"Stinson, Douglas R."}],"name":{"displayForm":["edited by Douglas R. Stinson"]},"title":[{"title":"Advances in Cryptology — CRYPTO’ 93","subtitle":"13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings","title_sort":"Advances in Cryptology — CRYPTO’ 93"}],"origin":[{"publisherPlace":"Berlin, Heidelberg","dateIssuedDisp":"1994","dateIssuedKey":"1994","publisher":"Springer-Verlag Berlin Heidelberg"}],"id":{"isbn":["9783540483298"],"doi":["10.1007/3-540-48329-2"],"eki":["1649304943"]}} | ||
| SRT | |a STINSONDOUADVANCESIN1994 | ||