ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
31
views
0
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,032
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Advances in Cryptology - ASIACRYPT 2008
other
Editor(s):
Josef Pieprzyk
Publication date
(Print):
2008
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Brain Science Advances
Author and book information
Book
ISBN (Print):
978-3-540-89254-0
ISBN (Electronic):
978-3-540-89255-7
Publication date (Print):
2008
DOI:
10.1007/978-3-540-89255-7
SO-VID:
96100e5d-4454-4c38-855a-f9c83d35aaeb
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 539
A New Attack on the LEX Stream Cipher
pp. 108
On the Security of HB# against a Man-in-the-Middle Attack
pp. 179
Universally Composable Adaptive Oblivious Transfer
pp. 344
On the Validity of the Φ-Hiding Assumption in Cryptographic Protocols
pp. 372
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
pp. 425
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
pp. 441
An Improved Impossible Differential Attack on MISTY1
pp. 455
Generalized Identity Based and Broadcast Encryption Schemes
Similar content
2,032
Asiacrypt '92
Authors:
H. Hörster
Advances in Cryptology – ASIACRYPT 2017
Authors:
Tsuyoshi Takagi
,
Thomas Peyrin
Advances in Cryptology - ASIACRYPT 2021
Authors:
A. Kim
,
Y Polyakov
,
V Zucca
…
See all similar