Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
23
views
0
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,562
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Advances in Cryptology — ASIACRYPT '96
other
Editor(s):
Kwangjo Kim
,
Tsutomu Matsumoto
Publication date
(Print):
1996
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Brain Science Advances
Author and book information
Book
ISBN (Print):
978-3-540-61872-0
ISBN (Electronic):
978-3-540-70707-3
Publication date (Print):
1996
DOI:
10.1007/BFb0034829
SO-VID:
b56c9b0a-8cf5-4a9c-a5fd-75c838011b3a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
A message recovery signature scheme equivalent to DSA over elliptic curves
pp. 15
Cryptographic protocols based on real-quadratic A-fields (extended abstract)
pp. 26
Minding your p's and q's
pp. 36
Authenticated multi-party key agreement
pp. 50
Cryptography and the internet: Lessons and challenges
pp. 57
Generating standard DSA signatures without long inversion
pp. 77
Hash functions based on block ciphers and quaternary codes
pp. 105
On applying linear cryptanalysis to IDEA
pp. 116
A multi-recastable ticket scheme for electronic elections
pp. 133
Observations on non-repudiation
pp. 145
On the efficiency of one-time digital signatures
pp. 159
A hidden cryptographic assumption in no-transferable indentification schemes
pp. 173
Electronic money and key management from global and regional points of view
pp. 185
Limiting the visible space visual secret sharing schemes and their application to human identification
pp. 196
Towards characterizing when information-theoretic secret key agreement is possible
pp. 210
Key sharing based on the wire-tap channel type II concept with noisy main channel
pp. 218
Generalization of higher order SAC to vector output Boolean functions
pp. 266
Cost-effective payment schemes with privacy regulation
pp. 276
Mis-representation of identities in e-cash schemes and how to prevent it
pp. 301
The validation of cryptographic algorithms
pp. 311
Convertible group signatures
pp. 334
On the risk of disruption in several multiparty signature schemes
pp. 346
Correlation attacks on cascades of clock controlled shift registers
pp. 382
A World Wide Number Field Sieve factoring record: On to 512 bits
pp. 91
Generalized Feistel networks
pp. 125
Some remarks on a receipt-free and universally verifiable Mix-type voting scheme
pp. 232
On the correlation immune functions and their nonlinearity
pp. 244
How to date blind signatures
pp. 252
Provably secure blind signature schemes
pp. 286
“Indirect discourse proofs”: Achieving efficient Fair Off-Line e-cash
pp. 322
How to utilize the transformability of digital signatures for solving the oracle problem
pp. 368
The cryptographic security of the syndrome decoding problem for rank distance codes
Similar content
2,562
Extensive Chaos in the Lorenz-96 Model
Authors:
A. Karimi
,
M Paul
miR-96-5p prevents hepatic stellate cell activation by inhibiting autophagy via ATG7
Authors:
Kangkang Yu
,
Ning Li
,
Qi Cheng
…
Revisiting the Aluminum Trimesate-Based MOF (MIL-96): From Structure Determination to the Processing of Mixed Matrix Membranes for CO2 Capture
Authors:
Marvin Benzaqui
,
Renjith S. Pillai
,
Freek Kapteijn
…
See all similar
Cited by
1
Cryptanalysis in Prime Order Subgroups of Zn*
Authors:
Wenbo Mao
,
Chae Lim
See all cited by