It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 05288cam 2200853Ja 4500
001 ocm22731675
003 OCoLC
005 20221114165515.0
008 901023s1990 gw a b 101 0 eng
010 $a 90022641
040 $aDLC$beng$cDLC$dOCL$dC$Q$dMUQ$dNLGGC$dBTCTA$dOCLCG$dBAKER$dOCLCG$dGBVCP$dZWZ$dGW5XE$dOCLCQ$dIUL$dMUU$dOCLCA$dOCLCF$dOCLCQ$dOCLCO$dOCLCQ$dOCL$dOCLCO$dOCLCA$dCAUOI$dOCLCQ$dOCLCA$dUWO$dHUELT$dOCLCQ$dIEUOL$dREU$dMM9$dIL4J6$dOCLCO
016 7 $a901429740$2DE-101
019 $a640825237$a960152136
020 $a3540534334$q(Berlin)
020 $a9783540534334$q(Berlin)
020 $a0387534334$q(New York)
020 $a9780387534336$q(New York)
035 $a(OCoLC)22731675$z(OCoLC)640825237$z(OCoLC)960152136
050 10 $aQA76.9.A25$bE964 1989
082 00 $a005.8/2$220
084 $a54.62$2bcl
084 $a*00B25$2msc
084 $a68-06$2msc
084 $a94-06$2msc
084 $a94A60$2msc
084 $a09$2sdnb
111 2 $aEUROCRYPT (Conference)$d(1989 :$cHouthalen, Belgium)
245 10 $aAdvances in cryptology--EUROCRYPT '89 :$bWorkshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989 : proceedings /$cJ.-J. Quisquater, J. Vandewalle, eds.
246 30 $aEUROCRYPT '89
260 $aBerlin ;$aNew York :$bSpringer-Verlag,$c©1990.
300 $ax, 710 pages :$billustrations ;$c25 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aLecture notes in computer science ;$v434
504 $aIncludes bibliographical references and index.
520 $a"This volume contains the proceedings of the Eurocrypt '89 conference, a workshop on theory and applications of cryptographic techniques. The International Association for Cryptologic Research (IACR) organizes two conferences each year, one in Europe and one in the United States. Eurocrypt '89 was the seventh European conference. The volume includes revised versions of nearly all the contributions presented at the conference, including shortened versions of the talks given at the special rump session for recent results. Recent outbreaks of viruses, worms and computer fraud together with progress in telecommunications, computer networks and automated banking have considerably increased the interest in data security techniques, where cryptography is generaly considered to be the most important tool. In this area of data security, where high stakes are at risk, up-to-date information is crucial. This book is organized into sections on public-key cryptosystems, theory, zero-knowledge protocols, applications, signature and untraceability, cryptanalysis, sharing and authentication schemes, sequences, algorithms, old problems, and impromptu talks."--Publisher's website.
530 $aAlso available via the World Wide Web.
505 0 $aSection 1. Public-key cryptosystems -- section 2. Theory -- section 3. Zero-knowledge protocols -- section 4. Applications -- section 5. Signature and untraceability -- section 6. Cryptanalysis -- section 7. Sharing and authentication schemes -- section 8. Sequences -- section 9. Algorithms -- section 10. Old problems.
508 $aOrganized by the International Association for Cryptologic Research.
650 0 $aComputer security$vCongresses.
650 0 $aCryptography$vCongresses.
650 1 $aCryptography.
650 6 $aSécurité informatique$vCongrès.
650 6 $aCryptographie$vCongrès.
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aCryptography.$2fast$0(OCoLC)fst00884552
650 17 $aCoderingstheorie.$2gtt
650 17 $aDataprocessing.$2gtt
650 17 $aGeheimschrift.$2gtt
650 7 $aCryptography$vCongresses.$2nli
650 7 $aComputers$xAccess control$vCongresses.$2nli
650 7 $aCryptographie$xInformatique$xCongrès.$2ram
653 0 $aComputer security$aCongresses
653 0 $aCryptography$aCongresses
655 7 $aConference papers and proceedings.$2fast$0(OCoLC)fst01423772
700 1 $aQuisquater, J.-J.$q(Jean-Jacques),$d1945-
700 1 $aVandewalle, J.$q(Joos),$d1948-
830 0 $aLecture notes in computer science ;$v434.
856 41 $3SpringerLink$uhttps://doi.org/10.1007/3-540-46885-4
856 41 $uhttp://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm$zRestricted to Springer LINK subscribers
856 41 $uhttp://link.springer.com/10.1007/3-540-46885-4$zeBook available for UOIT via SpringerLink. Click link to access
856 42 $3Inhaltstext$uhttp://www.zentralblatt-math.org/zmath/en/search/?an=0719.00028
856 4 $uhttp://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=434$zTexte intégral accessible en intranet pour l'Inria
856 4 $uhttp://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm$zConnect to Internet resource
938 $aBaker & Taylor$bBKTY$c99.00$d99.00$i0387534334$n0001869657$sactive
938 $aBaker and Taylor$bBTCP$n90022641$cDM98.00
029 1 $aAU@$b000007659083
029 1 $aGBVCP$b022691286
029 1 $aNLGGC$b13953010X
029 1 $aNZ1$b3762987
029 1 $aZWZ$b021793344
994 $aZ0$bGTX
948 $hNO HOLDINGS IN GTX - 200 OTHER HOLDINGS