Advances in Cryptology-CRYPTO ’94: 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings
This volume constitutes the proceedings of CRYPTO '94, the 14th International Cryptology Conference, held at Santa Barbara, CA, USA in August 1994 under the sponsorship of the International Association for Cryptologic Research (IACR). The proceedings contains revised versions of the 38 papers s...
Gespeichert in:
| 1. Verfasser: | |
|---|---|
| Dokumenttyp: | Konferenzschrift |
| Sprache: | Englisch |
| Veröffentlicht: |
Berlin, Heidelberg
Springer-Verlag Berlin Heidelberg
1994
|
| Schriftenreihe: | Lecture notes in computer science
839 |
| In: |
Lecture notes in computer science (839)
|
| Volumes / Articles: | Show Volumes / Articles. |
| DOI: | 10.1007/3-540-48658-5 |
| Schlagworte: | |
| Online-Zugang: | Verlag, lizenzpflichtig, Volltext: https://doi.org/10.1007/3-540-48658-5 Resolving-System, lizenzpflichtig, Volltext: http://dx.doi.org/10.1007/3-540-48658-5 Verlag, Volltext: http://www.link.springer.de/link/service/series/0558/tocs/t0839.htm Cover: https://swbplus.bsz-bw.de/bsz322907179cov.jpg Verlag, Zentralblatt MATH, Inhaltstext: https://zbmath.org/?q=an:0856.00052 |
| Verfasserangaben: | edited by Yvo G. Desmedt |
MARC
| LEADER | 00000cam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 1649309236 | ||
| 003 | DE-627 | ||
| 005 | 20250515182533.0 | ||
| 007 | cr uuu---uuuuu | ||
| 008 | 100510s1994 gw |||||o 00| ||eng c | ||
| 020 | |a 9783540486589 |9 978-3-540-48658-9 | ||
| 024 | 7 | |a 10.1007/3-540-48658-5 |2 doi | |
| 035 | |a (DE-627)1649309236 | ||
| 035 | |a (DE-576)322907179 | ||
| 035 | |a (DE-599)BSZ322907179 | ||
| 035 | |a (OCoLC)845439940 | ||
| 035 | |a (OCoLC)699834702 | ||
| 035 | |a (OCoLC)1047821137 | ||
| 035 | |a (DE-601)NLM003694038 | ||
| 035 | |a (DE-He213)978-3-540-48658-9 | ||
| 035 | |a (DE-627-1)040492214 | ||
| 035 | |a (ZBM)0856.00052 | ||
| 040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
| 041 | |a eng | ||
| 044 | |c XA-DE-BE | ||
| 050 | 0 | |a QA76.9.A25 | |
| 072 | 7 | |a GPJ |2 bicssc | |
| 072 | 7 | |a URY |2 bicssc | |
| 072 | 7 | |a COM053000 |2 bisacsh | |
| 082 | 0 | |a 005.82 |2 23 | |
| 082 | 0 | |a 005.824 |2 23 | |
| 082 | 0 | |a 001.64 | |
| 082 | 0 | |a 005.8/2 | |
| 084 | |a 28 |2 sdnb | ||
| 084 | |a 28 |2 sdnb | ||
| 084 | |a 27 |2 sdnb | ||
| 084 | |a 28 |2 sdnb | ||
| 084 | |a ST 276 |2 rvk |0 (DE-625)rvk/143642: | ||
| 084 | |a SK 170 |2 rvk |0 (DE-625)rvk/143221: | ||
| 084 | |a *00B25 |2 msc | ||
| 084 | |a 94-06 |2 msc | ||
| 084 | |a 94A60 |2 msc | ||
| 084 | |a 53.71 |2 bkl | ||
| 084 | |a 54.38 |2 bkl | ||
| 084 | |a 54.62 |2 bkl | ||
| 084 | |a 54.80 |2 bkl | ||
| 100 | 1 | |a Desmedt, Yvo G. |0 (DE-627)1240245920 |0 (DE-576)170245926 |4 aut | |
| 245 | 1 | 0 | |a Advances in Cryptology-CRYPTO ’94 |b 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings |c edited by Yvo G. Desmedt |
| 264 | 1 | |a Berlin, Heidelberg |b Springer-Verlag Berlin Heidelberg |c 1994 | |
| 300 | |a Online-Ressource | ||
| 336 | |a Text |b txt |2 rdacontent | ||
| 337 | |a Computermedien |b c |2 rdamedia | ||
| 338 | |a Online-Ressource |b cr |2 rdacarrier | ||
| 490 | 1 | |a Lecture Notes in Computer Science |v 839 | |
| 490 | 0 | |a SpringerLink |a Bücher | |
| 500 | |a Literaturangaben | ||
| 520 | |a This volume constitutes the proceedings of CRYPTO '94, the 14th International Cryptology Conference, held at Santa Barbara, CA, USA in August 1994 under the sponsorship of the International Association for Cryptologic Research (IACR). The proceedings contains revised versions of the 38 papers selected for presentation at the conference from a total of 114 submissions. All aspects of cryptologic research and advanced applications are addressed; in particular there are sections on block ciphers, signatures, implementation and hardware aspects, authentication and secret sharing, zero-knowledge, combinatorics, number theory, cryptanalysis and protocol failures, and secure computations and protocols | ||
| 650 | 0 | |a Computer Science | |
| 650 | 0 | |a Computer science | |
| 650 | 0 | |a Computer Communication Networks | |
| 650 | 0 | |a Combinatorics | |
| 650 | 0 | |a Information theory. | |
| 650 | 0 | |a Cryptography. | |
| 650 | 0 | |a Discrete mathematics. | |
| 650 | 0 | |a Computer networks . | |
| 650 | 0 | |a Coding theory | |
| 650 | 0 | |a Data encryption (Computer science) | |
| 650 | 0 | |a Operating systems (Computers) | |
| 655 | 7 | |a Konferenzschrift |y 1994 |z Santa Barbara, Calif. |0 (DE-588)1071861417 |0 (DE-627)826484824 |0 (DE-576)433375485 |2 gnd-content | |
| 689 | 0 | 0 | |d s |0 (DE-588)4033329-2 |0 (DE-627)106257862 |0 (DE-576)209001321 |a Kryptologie |2 gnd |
| 689 | 0 | |5 DE-101 | |
| 689 | 1 | 0 | |d s |0 (DE-588)4033329-2 |0 (DE-627)106257862 |0 (DE-576)209001321 |a Kryptologie |2 gnd |
| 689 | 1 | |5 (DE-627) | |
| 689 | 2 | 0 | |d s |0 (DE-588)4033329-2 |0 (DE-627)106257862 |0 (DE-576)209001321 |a Kryptologie |2 gnd |
| 689 | 2 | |5 (DE-627) | |
| 689 | 3 | 0 | |d s |0 (DE-588)4033329-2 |0 (DE-627)106257862 |0 (DE-576)209001321 |a Kryptologie |2 gnd |
| 689 | 3 | |5 (DE-627) | |
| 689 | 4 | 0 | |d s |0 (DE-588)4033329-2 |0 (DE-627)106257862 |0 (DE-576)209001321 |a Kryptologie |2 gnd |
| 689 | 4 | |5 (DE-627) | |
| 776 | 1 | |z 9783540583332 | |
| 776 | 0 | 8 | |i Buchausg. u.d.T. |t Advances in cryptology - CRYPTO '94 |d Berlin : Springer, 1994 |h XII, 438 S. |w (DE-627)272028134 |w (DE-576)040615251 |z 3540583335 |z 0387583335 |
| 830 | 0 | |a Lecture notes in computer science |v 839 |9 839 |w (DE-627)316228877 |w (DE-576)093890923 |w (DE-600)2018930-8 |x 1611-3349 |7 am | |
| 856 | 4 | 0 | |u https://doi.org/10.1007/3-540-48658-5 |m X:SPRINGER |x Verlag |z lizenzpflichtig |3 Volltext |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1007/3-540-48658-5 |x Resolving-System |z lizenzpflichtig |3 Volltext |
| 856 | 4 | 0 | |u http://www.link.springer.de/link/service/series/0558/tocs/t0839.htm |x Verlag |3 Volltext |
| 856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz322907179cov.jpg |m V:DE-576 |m X:springer |q image/jpeg |v 20150317120243 |3 Cover |
| 856 | 4 | 2 | |u https://zbmath.org/?q=an:0856.00052 |m B:ZBM |v 2021-04-12 |x Verlag |y Zentralblatt MATH |3 Inhaltstext |
| 889 | |w (DE-576)9332909288 | ||
| 889 | |w (DE-627)749154357 | ||
| 889 | |w (DE-627)33290928X | ||
| 912 | |a ZDB-2-LNC |b 1994 | ||
| 912 | |a ZDB-2-SCS |b 1994 | ||
| 912 | |a ZDB-2-BAE |b 1994 | ||
| 912 | |a ZDB-2-SXCS |b 1994 | ||
| 912 | |a ZDB-2-SEB |b 1994 | ||
| 912 | |a GBV-SPRINGER-LNCS | ||
| 912 | |a ZDB-1-SLN | ||
| 935 | |h GBV |i ExPruef | ||
| 936 | r | v | |a ST 276 |b Datensicherung (physik.) und angewandte Kryptographie, Computerviren |k Informatik |k Monografien |k Software und -entwicklung |k Datensicherung (physik.) und angewandte Kryptographie, Computerviren |0 (DE-627)127148207X |0 (DE-625)rvk/143642: |0 (DE-576)20148207X |
| 936 | r | v | |a SK 170 |b Kombinatorik (klassisch) |k Mathematik |k Monografien |k Kombinatorik (klassisch) |0 (DE-627)1271156180 |0 (DE-625)rvk/143221: |0 (DE-576)201156180 |
| 936 | r | u | |a SS 4800 |b Lecture notes in computer science |k Lecture notes in computer science |0 (DE-627)1271461242 |0 (DE-625)rvk/143528: |0 (DE-576)201461242 |z Ungueltig |
| 936 | r | u | |a SS 1994 |b Veranstaltungsjahr 1994 |k Veranstaltungsjahr 1994 |0 (DE-627)1271485842 |0 (DE-625)rvk/143431: |0 (DE-576)201485842 |z Ungueltig |
| 936 | b | k | |a 53.71 |j Theoretische Nachrichtentechnik |q SEPA |0 (DE-627)10641870X |
| 936 | b | k | |a 54.38 |j Computersicherheit |q SEPA |0 (DE-627)106418866 |
| 936 | b | k | |a 54.62 |j Datenstrukturen |q SEPA |0 (DE-627)106403265 |
| 936 | b | k | |a 54.80 |j Angewandte Informatik |q SEPA |0 (DE-627)106417967 |
| 951 | |a BO | ||
| 990 | |a Kryptologie | ||
| 990 | |a Kryptologie | ||
| 990 | |a Kryptologie | ||
| 990 | |a Kryptologie | ||
| 990 | |a Kryptologie | ||
| 992 | |a 20230606 | ||
| 999 | |a KXP-PPN1649309236 |e 4329676230 | ||
| BIB | |a Y | ||
| SPR | |a Y | ||
| JSO | |a {"relMultPart":[{"id":{"issn":["1611-3349"],"zdb":["2018930-8"],"eki":["316228877"]},"origin":[{"publisherPlace":"Berlin ; Heidelberg","publisher":"Springer","dateIssuedKey":"1973","dateIssuedDisp":"1973-"}],"dispAlt":"Lecture notes in computer science","physDesc":[{"extent":"Online-Ressource"}],"title":[{"title_sort":"Lecture notes in computer science","title":"Lecture notes in computer science"}],"part":{"number":["839"],"number_sort":["839"]},"titleAlt":[{"title":"LNCS online"},{"title":"LNAI"},{"title":"Lecture notes in artificial intelligence"},{"title":"Lecture notes in bioinformatics"},{"title":"LNAI"},{"title":"LNBI"},{"title":"LNCS-LNAI"},{"title":"LNCS-LNBI"}],"pubHistory":["1.1973 -"],"language":["eng"],"recId":"316228877","disp":"Lecture Notes in Computer Science","type":{"bibl":"serial","media":"Online-Ressource"},"note":["Gesehen am 28.02.20","Das Gesamtwerk gliedert sich in: Lecture notes in artificial intelligence; Lecture notes in bioinformatics"]}],"recId":"1649309236","language":["eng"],"type":{"media":"Online-Ressource","bibl":"book"},"note":["Literaturangaben"],"physDesc":[{"extent":"Online-Ressource"}],"id":{"eki":["1649309236"],"doi":["10.1007/3-540-48658-5"],"isbn":["9783540486589"]},"title":[{"title_sort":"Advances in Cryptology-CRYPTO ’94","title":"Advances in Cryptology-CRYPTO ’94","subtitle":"14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings"}],"origin":[{"dateIssuedKey":"1994","publisher":"Springer-Verlag Berlin Heidelberg","dateIssuedDisp":"1994","publisherPlace":"Berlin, Heidelberg"}],"person":[{"display":"Desmedt, Yvo G.","role":"aut","family":"Desmedt","given":"Yvo G."}],"name":{"displayForm":["edited by Yvo G. Desmedt"]}} | ||
| SRT | |a DESMEDTYVOADVANCESIN1994 | ||