- Author:Carl Pomerance
- Publisher:Springer; 1 edition (February 22, 1988)
- Pages:463 pages
- Subcategory:Security & Encryption
- FB2 format1467 kb
- ePUB format1625 kb
- DJVU format1994 kb
- Formats:lrf rtf lrf docx
Bibliographic Information. Advances in Cryptology - CRYPTO '87. Book Subtitle. Lecture Notes in Computer Science.
Bibliographic Information. Springer-Verlag Berlin Heidelberg.
Conference proceedings CRYPTO 1987. Part of the Lecture Notes in Computer Science book series (LNCS, volume 293). authentication cryptoanalysis cryptography cryptology cryptosystems data security digital signature encryption privacy security.
Multiparty Computations Ensuring Privacy of Each Partys Input and Correctness of the Result. Часто встречающиеся слова и выражения.
CRYPTO '87 was attended by 170 people representing 19 countries. The papers in this volume are presented in seven sections
CRYPTO '87 was attended by 170 people representing 19 countries. The papers in this volume are presented in seven sections. The first six sections comprise all of the papers on the regular program, including two papers that were not presented at the meeting. The seventh section contains some of the papers presented at a "Rump Session".
from book Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of. .
from book Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding. Conference Paper · May 2000 with 12 Reads. How we measure 'reads'. This was because the fastest algorithm known at the time for computing logarithms in the divisor class group of a genus-g hyperelliptic curve over F q had (heuristic) running time O(q 2 ) (for fixed g and q → ∞), see, which was faster than the running time O(q n/2 ) of Pollard's rho method.
To get the free app, enter your mobile phone number.
Please complete the purchase of any items in your cart before going to this third-party site. Also note that if you qualify for financial aid, items purchased through this site will not be subject to reimbursement. Some error text about your books and stuff. Advances in Cryptology - CRYPTO '86: Proceedings (Lecture Notes in Computer Science). by Andrew M. Odlyzko.
We note that this proof is in fact quite independent of the details of the FLS protocol and can be understood without a deep knowledge of the techniques of that paper. 5 Our solution also applies for the usage of one-way (rather than trapdoor) permutations in the protocol with an unbounded prover.
ISSN 1611-3349 (electronic). ISBN 978-3-319-94666-5. ISBN 978-3-319-94667-2 (eBook). Library of Congress Control Number: 2018939453. LNCS Sublibrary: SL1 – Theoretical Computer Science and General Issues. This proceedings volume contains papers presented at IWOCA 2018, the 29th Inter-national Workshop on Combinatorial Algorithms, held during July 16–19, 2018, at the Department of Computer Science, National University of Singapore (NUS), Singapore.
Lecture Notes in Computer Science is a series of computer science books published by Springer Science+Business Media since 1973. The series contains proceedings, post-proceedings, and monographs. In addition, tutorials, state-of-the-art surveys, and "hot topics" are increasingly being included. Two sub-series are: Lecture Notes in Artificial Intelligence. Lecture Notes in Bioinformatics. Monographiae Biologicae, another monograph series published by Springer Science+Business Media.