|
|
|
|
LEADER |
04907nam a2200925Ia 4500 |
001 |
0f225387-132c-403b-9347-dced4803c9fa |
005 |
20240926000000.0 |
008 |
081017s2006 gw a ob 101 0 eng d |
016 |
7 |
|
|a 981654711
|2 DE-101
|
019 |
|
|
|a 77083498
|a 317881303
|
020 |
|
|
|a 3540494758
|
020 |
|
|
|a 3540494766
|
020 |
|
|
|a 9783540494751
|
020 |
|
|
|a 9783540494768
|
024 |
7 |
|
|a 10.1007/11935230
|2 doi
|
035 |
|
|
|a (OCoLC)262694300
|z (OCoLC)77083498
|z (OCoLC)317881303
|z (OCoLC)1066686730
|z (OCoLC)1105593386
|z (OCoLC)1132296703
|
035 |
|
|
|a (OCoLC)262694300
|z (OCoLC)77083498
|z (OCoLC)317881303
|
035 |
|
|
|a (Sirsi) a13364866
|
035 |
|
|
|a (Sirsi) spocn262694300
|
037 |
|
|
|a 978-3-540-49475-1
|b Springer
|n http://www.springerlink.com
|
040 |
|
|
|a GW5XE
|b eng
|e pn
|c GW5XE
|d GW5XE
|d CEF
|d GZM
|d OKU
|d W2U
|d DAY
|d OCLCQ
|d OCLCF
|d BEDGE
|d OCLCQ
|d ITD
|d OCLCO
|d OCLCQ
|d OCL
|d OCLCO
|d OCLCQ
|d EBLCP
|d OCLCA
|d UAB
|d ESU
|d U3W
|d OCLCA
|d OCLCQ
|d TFW
|d ICG
|d LEAUB
|d AU@
|d OCLCQ
|d AUD
|d WYU
|d HS0
|d WURST
|d OCLCQ
|d OCLCO
|d COM
|d OCLCO
|d OCLCQ
|d CSt
|
040 |
|
|
|a GW5XE
|b eng
|e pn
|c GW5XE
|d GW5XE
|d CEF
|d GZM
|d OKU
|d W2U
|d DAY
|d OCLCQ
|d OCLCF
|d BEDGE
|d OCLCQ
|d ITD
|d OCLCO
|d OCLCQ
|d OCL
|d OCLCO
|d OCLCQ
|d EBLCP
|
049 |
|
|
|a MAIN
|
050 |
|
4 |
|a QA76.9.A25
|b I555 2006
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a QA
|2 lcco
|
072 |
|
7 |
|a URY
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 22
|
111 |
2 |
|
|a International Conference on the Theory and Application of Cryptology and Information Security
|n (12th :
|d 2006 :
|c Shanghai, China)
|
245 |
1 |
0 |
|a Advances in cryptology-- ASIACRYPT 2006 :
|b 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006 ; proceedings /
|c Xuejia Lai, Kefei Chen (eds.)
|
246 |
3 |
0 |
|a ASIACRYPT 2006
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer,
|c ©2006
|
300 |
|
|
|a 1 online resource (xiv, 468 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
490 |
1 |
|
|a Lecture notes in computer science,
|x 0302-9743 ;
|v 4284
|
500 |
|
|
|a "IACR, International Association for Cryptologic Research"--Logo on cover
|
504 |
|
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Attacks on hash functions -- Stream ciphers and boolean functions -- Biometrics and ECC computation -- ID-based schemes -- Public-key schemes -- RSA and factorization -- Construction of hash function --- Protocols -- Block ciphers -- Signatures
|
588 |
0 |
|
|a Print version record
|
650 |
|
0 |
|a Computer security
|v Congresses
|
650 |
|
0 |
|a Cryptography
|v Congresses
|
650 |
|
6 |
|a Cryptographie
|v Congrès
|
650 |
|
6 |
|a Sécurité informatique
|v Congrès
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Cryptography
|2 fast
|
650 |
|
7 |
|a Informatique
|2 eclas
|
653 |
0 |
0 |
|a algorithms
|
653 |
0 |
0 |
|a algoritmen
|
653 |
0 |
0 |
|a computer analysis
|
653 |
0 |
0 |
|a computer networks
|
653 |
0 |
0 |
|a computer sciences
|
653 |
0 |
0 |
|a computeranalyse
|
653 |
0 |
0 |
|a computernetwerken
|
653 |
0 |
0 |
|a computerwetenschappen
|
653 |
0 |
0 |
|a data management
|
653 |
0 |
0 |
|a gegevensbeheer
|
653 |
0 |
0 |
|a informatiesystemen
|
653 |
0 |
0 |
|a information systems
|
653 |
0 |
0 |
|a mathematics
|
653 |
0 |
0 |
|a wiskunde
|
653 |
1 |
0 |
|a Informatie- en communicatietechnologie (algemeen)
|
653 |
1 |
0 |
|a Information and Communication Technology (General)
|
655 |
|
4 |
|a Electronic books
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
700 |
1 |
|
|a Chen, Kefei,
|d 1959-
|1 http://viaf.org/viaf/8107450
|
700 |
1 |
|
|a Chen, Kefei,
|d 1959-
|
700 |
1 |
|
|a Lai, Xuejia
|1 http://viaf.org/viaf/30203176
|
700 |
1 |
|
|a Lai, Xuejia
|
710 |
2 |
|
|a International Association for Cryptologic Research
|1 http://viaf.org/viaf/141764476
|
710 |
2 |
|
|a International Association for Cryptologic Research
|
776 |
0 |
8 |
|i Print version:
|a International Conference on the Theory and Application of Cryptology and Information Security (12th : 2006 : Shanghai, China)
|t Advances in cryptology-- ASIACRYPT 2006.
|d Berlin ; New York : Springer, ©2006
|z 9783540494751
|z 3540494758
|w (DLC) 2006936348
|w (OCoLC)76873867
|
830 |
|
0 |
|a Lecture notes in computer science ;
|v 4284
|x 0302-9743
|
999 |
1 |
0 |
|i 0f225387-132c-403b-9347-dced4803c9fa
|l a13364866
|s US-CST
|m advances_in_cryptology_asiacrypt_200612th_international_conference_on______2006_______sprina________________________________________international_confer_______________e
|
999 |
1 |
0 |
|i 0f225387-132c-403b-9347-dced4803c9fa
|l 11069378
|s US-ICU
|m advances_in_cryptology_asiacrypt_200612th_international_conference_on______2006_______sprina________________________________________international_confer_______________e
|
999 |
1 |
1 |
|l a13364866
|s ISIL:US-CST
|t BKS
|b 52fed159-2647-5296-b1f2-a1ecb8acae51
|y 52fed159-2647-5296-b1f2-a1ecb8acae51
|p UNLOANABLE
|
999 |
1 |
1 |
|l a13364866
|s ISIL:US-CST
|t BKS
|a SUL-ELECTRONIC
|p UNLOANABLE
|