74,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
37 °P sammeln
  • Broschiertes Buch

This book constitutes the refereed proceedings of the 24th Annual International Cryptology Conference, CRYPTO 2004, held in Santa Barbara, California, USA in August 2004.
The 33 revised full papers presented together with one invited paper were carefully reviewed and selected from 211 submissions. The papers are organized in topical sections in linear cryptanalysis, group signatures, foundations, efficient representations, public key cryptanalysis, zero-knowledge, hash collision, secure computation, stream cipher cryptanalysis, public key encryption, bounded storage model, key management,…mehr

Produktbeschreibung
This book constitutes the refereed proceedings of the 24th Annual International Cryptology Conference, CRYPTO 2004, held in Santa Barbara, California, USA in August 2004.

The 33 revised full papers presented together with one invited paper were carefully reviewed and selected from 211 submissions. The papers are organized in topical sections in linear cryptanalysis, group signatures, foundations, efficient representations, public key cryptanalysis, zero-knowledge, hash collision, secure computation, stream cipher cryptanalysis, public key encryption, bounded storage model, key management, and computationally unbounded adversaries.
Crypto 2004, the 24th Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The program committee accepted 33 papers for presentation at the conf- ence. These were selected from a total of 211 submissions. Each paper received at least three independent reviews. The selection process included a Web-based discussion phase, and a one-day program committee meeting at New York U- versity. These proceedings include updated versions of the 33 accepted papers. The authors had a few weeks to revise them, aided by comments from the reviewers. However, the revisions were not subjected to any editorial review. Theconferenceprogramincludedtwoinvitedlectures.VictorShoup'sinvited talk was a survey on chosen ciphertext security in public-key encryption. Susan Landau's invited talk was entitled "Security, Liberty, and Electronic Commu- cations". Her extended abstract is included in these proceedings. We continued the tradition of a Rump Session, chaired by Stuart Haber. Those presentations (always short, often serious) are not included here.
Autorenporträt
Matt Franklin, University of California, Davis, CA, USA