{"title":"Practice-Oriented Provable Security","authors":"M. Bellare","doi":"10.1007/3-540-48969-X_1","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_1","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128779413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging Standards for Public-Key Cryptography","authors":"B. Kaliski","doi":"10.1007/3-540-48969-X_4","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_4","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131902423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unconditional Security in Cryptography","authors":"S. Wolf","doi":"10.1007/3-540-48969-X_10","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_10","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114424303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The State of Cryptographic Hash Functions","authors":"B. Preneel","doi":"10.1007/3-540-48969-X_8","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_8","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contemporary Block Ciphers","authors":"L. Knudsen","doi":"10.1007/3-540-48969-X_5","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_5","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127099836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Search for the Holy Grail in Quantum Cryptography","authors":"L. Salvail","doi":"10.1007/3-540-48969-X_9","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_9","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127900788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to Secure Computation","authors":"R. Cramer","doi":"10.1007/3-540-48969-X_2","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_2","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123070690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Commitment Schemes and Zero-Knowledge Protocols","authors":"I. Damgård","doi":"10.1007/3-540-48969-X_3","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_3","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127512704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signing Contracts and Paying Electronically","authors":"Torben P. Pedersen","doi":"10.1007/3-540-48969-X_7","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_7","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129376749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Primality Tests and Use of Primes in Public-Key Systems","authors":"P. Landrock","doi":"10.1007/3-540-48969-X_6","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_6","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129820069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}