Lectures on Data Security最新文献

筛选
英文 中文
Practice-Oriented Provable Security 面向实践的可证明安全性
Lectures on Data Security Pub Date : 1998-06-28 DOI: 10.1007/3-540-48969-X_1
M. Bellare
{"title":"Practice-Oriented Provable Security","authors":"M. Bellare","doi":"10.1007/3-540-48969-X_1","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_1","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128779413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Emerging Standards for Public-Key Cryptography 公钥加密的新兴标准
Lectures on Data Security Pub Date : 1998-06-28 DOI: 10.1007/3-540-48969-X_4
B. Kaliski
{"title":"Emerging Standards for Public-Key Cryptography","authors":"B. Kaliski","doi":"10.1007/3-540-48969-X_4","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_4","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131902423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Unconditional Security in Cryptography 密码学中的无条件安全性
Lectures on Data Security Pub Date : 1900-01-01 DOI: 10.1007/3-540-48969-X_10
S. Wolf
{"title":"Unconditional Security in Cryptography","authors":"S. Wolf","doi":"10.1007/3-540-48969-X_10","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_10","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114424303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
The State of Cryptographic Hash Functions 加密哈希函数的状态
Lectures on Data Security Pub Date : 1900-01-01 DOI: 10.1007/3-540-48969-X_8
B. Preneel
{"title":"The State of Cryptographic Hash Functions","authors":"B. Preneel","doi":"10.1007/3-540-48969-X_8","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_8","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 106
Contemporary Block Ciphers 当代分组密码
Lectures on Data Security Pub Date : 1900-01-01 DOI: 10.1007/3-540-48969-X_5
L. Knudsen
{"title":"Contemporary Block Ciphers","authors":"L. Knudsen","doi":"10.1007/3-540-48969-X_5","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_5","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127099836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
The Search for the Holy Grail in Quantum Cryptography 寻找量子密码学中的圣杯
Lectures on Data Security Pub Date : 1900-01-01 DOI: 10.1007/3-540-48969-X_9
L. Salvail
{"title":"The Search for the Holy Grail in Quantum Cryptography","authors":"L. Salvail","doi":"10.1007/3-540-48969-X_9","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_9","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127900788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Introduction to Secure Computation 安全计算概论
Lectures on Data Security Pub Date : 1900-01-01 DOI: 10.1007/3-540-48969-X_2
R. Cramer
{"title":"Introduction to Secure Computation","authors":"R. Cramer","doi":"10.1007/3-540-48969-X_2","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_2","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123070690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Commitment Schemes and Zero-Knowledge Protocols 承诺方案和零知识协议
Lectures on Data Security Pub Date : 1900-01-01 DOI: 10.1007/3-540-48969-X_3
I. Damgård
{"title":"Commitment Schemes and Zero-Knowledge Protocols","authors":"I. Damgård","doi":"10.1007/3-540-48969-X_3","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_3","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127512704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 164
Signing Contracts and Paying Electronically 签订合同和电子支付
Lectures on Data Security Pub Date : 1900-01-01 DOI: 10.1007/3-540-48969-X_7
Torben P. Pedersen
{"title":"Signing Contracts and Paying Electronically","authors":"Torben P. Pedersen","doi":"10.1007/3-540-48969-X_7","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_7","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129376749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Primality Tests and Use of Primes in Public-Key Systems 公钥系统中素数的检验和使用
Lectures on Data Security Pub Date : 1900-01-01 DOI: 10.1007/3-540-48969-X_6
P. Landrock
{"title":"Primality Tests and Use of Primes in Public-Key Systems","authors":"P. Landrock","doi":"10.1007/3-540-48969-X_6","DOIUrl":"https://doi.org/10.1007/3-540-48969-X_6","url":null,"abstract":"","PeriodicalId":420429,"journal":{"name":"Lectures on Data Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129820069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信