{"entities":{"Q1365611":{"pageid":1376351,"ns":120,"title":"Item:Q1365611","lastrevid":67254963,"modified":"2026-04-12T16:24:08Z","type":"item","id":"Q1365611","labels":{"en":{"language":"en","value":"Advances in Cryptology -- CRYPTO '97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17--21, 1997. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1057464"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1365611$B497E77B-FDB3-4C4E-AC5E-22312806AB3E","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"fc0da2d3118bbe3b41984c2dbcb73d6d2938eb25","datavalue":{"value":{"text":"Advances in Cryptology -- CRYPTO '97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17--21, 1997. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1365611$F4EAA791-59E7-434D-AEE9-07DF3853EE59","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"85f384d6d98c0718d521ce64196a2de4e2d1e0da","datavalue":{"value":"0870.00047","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1365611$D59D5F5B-D31C-450A-8DA6-57311C00D47B","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1365611$E3728806-3584-4263-9E7B-9B9F3495E347","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"28b9596eafbe4f7af330e206cbe61b9813bd2dea","datavalue":{"value":{"time":"+1997-09-04T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1365611$C5209487-CD2F-4AA7-AFB4-AE3A9ED1273F","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"d8216ab577e741f3d998d6ab408b3d2a841c3687","datavalue":{"value":"The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1066.94500].  Indexed articles:  \\textit{Goldmann, Mikael; N\u00e4slund, Mats}, The complexity of computing hard core predicates, 1-15 [Zbl 0884.68046]  \\textit{Fujisaki, Eiichiro; Okamoto, Tatsuaki}, Statistical zero knowledge protocols to prove modular polynomial relations, 16-30 [Zbl 0880.94007]  \\textit{Di Crescenzo, Giovanni; Okamoto, Tatsuaki; Yung, Moti}, Keeping the SZK-verifier honest unconditionally, 31-45 [Zbl 0880.94006]  \\textit{Goldreich, Oded}, On the foundations of modern cryptography, 46-74 [Zbl 1030.94503]  \\textit{Beaver, Donald}, Plug and play encryption, 75-89 [Zbl 0882.94014]  \\textit{Canetti, Ran; Dwork, Cynthia; Naor, Moni; Ostrovsky, Rafail}, Deniable encryption, 90-104 [Zbl 0882.94019]  \\textit{Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai}, Eliminating decryption errors in the Ajtai-Dwork cryptosystem, 105-111 [Zbl 0889.94010]  \\textit{Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai}, Public-key cryptosystems from lattice reduction problems, 112-131 [Zbl 0889.94011]  \\textit{Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal}, RSA-based undeniable signatures, 132-149 [Zbl 0886.94007]  \\textit{Juels, Ari; Luby, Michael; Ostrowsky, Rafail}, Security of blind digital signatures. (Extended abstract), 150-164 [Zbl 0886.94008]  \\textit{Zheng, Yuliang}, Digital signcryption or how to achieve cost(signature \\& encryption) \\(\\ll\\) cost(signature) + cost(encryption)., 165-179 [Zbl 1058.94524]  \\textit{Gennaro, Rosario; Rohatgi, Pankaj}, How to sign digital streams, 180-197 [Zbl 0884.68047]  \\textit{Nguyen, Phong; Stern, Jacques}, Merkle-Hellman revisited: a cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations, 198-212 [Zbl 0882.94025]  \\textit{Berson, Thomas A.}, Failure of the McEliece public-key cryptosystem under message-resend and related-message attack, 213-220 [Zbl 0887.94008]  \\textit{Misarsky, Jean-Fran\u00e7ois}, A multiplicative attack using LLL algorithm on RSA signatures with redundancy, 221-234 [Zbl 0882.94024]  \\textit{Bleichenbacher, D.}, On the security of the KMOV public key cryptosystem, 235-248 [Zbl 0882.94016]  \\textit{Lim, Chae Hoon; Lee, Pil Joong}, A key recovery attack on discrete log-based schemes using a prime order subgroup, 249-263 [Zbl 0888.94017]  \\textit{Young, Adam; Yung, Moti}, The prevalence of kleptographic attacks on discrete-log based cryptosystems, 264-276 [Zbl 0886.94009]  \\textit{Bellare, Mihir; Goldwasser, Shafi; Micciancio, Daniele}, `Pseudo-random' number generation within cryptographic algorithms: The DDS case, 277-291 [Zbl 0893.94044]  \\textit{Cachin, Christian; Maurer, Ueli}, Unconditional security against memory-bounded adversaries., 292-306 [Zbl 1059.94527]  \\textit{Maurer, Ueli; Wolf, Stefan}, Privacy amplification secure against active adversaries, 307-321 [Zbl 0898.94007]  \\textit{Naor, Moni; Pinkas, Benny}, Visual authentication and identification, 322-336 [Zbl 0880.94008]  \\textit{Brassard, Gilles}, Quantum information processing: The good, the bad and the ugly, 337-341 [Zbl 0888.94010]  \\textit{Guajardo, Jorge; Paar, Christof}, Efficient algorithms for elliptic curve cryptosystems, 342-356 [Zbl 0937.94009]  \\textit{Solinas, Jerome A.}, An improved algorithm for arithmetic on a family of elliptic curves, 357-371 [Zbl 1032.11062]  \\textit{Takagi, Tsuyoshi}, Fast RSA-type cryptosystems using \\(n\\)-adic expansion, 372-384 [Zbl 0890.94025]  \\textit{Buchmann, Johannes; Paulus, Sachar}, A one way function based on ideal arithmetic in number fields, 385-394 [Zbl 0888.94011]  \\textit{Dolev, Shlomi; Ostrovsky, Rafail}, Efficient anonymous multicast and reception. (Extended abstract)., 395-409 [Zbl 1058.94521]  \\textit{Camenisch, Jan; Stadler, Markus}, Efficient group signature schemes for large groups. (Extended abstract), 410-424 [Zbl 0882.94018]  \\textit{Boneh, Dan; Franklin, Matthew}, Efficient generation of shared RSA keys. (Extended abstract), 425-439 [Zbl 0882.94017]  \\textit{Frankel, Yair; Gemmell, Peter; MacKenzie, Philip D.; Yung, Moti}, Proactive RSA, 440-454 [Zbl 0882.94020]  \\textit{Canetti, Ran}, Towards realizing random oracles: hash functions that hide all partial information, 455-469 [Zbl 0884.68048]  \\textit{Bellare, Mihir; Rogaway, Phillip}, Collision-resistant hashing: Towards making UOWHFs practical, 470-484 [Zbl 0882.94015]  \\textit{Knudsen, Lars; Preneel, Bart}, Fast and secure hashing based on codes, 485-498 [Zbl 0882.94023]  \\textit{Goli\u0107, Jovan Dj.; Menicocci, Renato}, Edit distance correlation attack on the alternating step generator, 499-512 [Zbl 0882.94013]  \\textit{Biham, Eli; Shamir, Adi}, Differential fault analysis of secret key cryptosystems, 513-525 [Zbl 0886.94010]  \\textit{Wagner, David; Schneier, Bruce; Kelsey, John}, Cryptoanalysis of the cellular message encryption algorithm, 526-537 [Zbl 0888.94023]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1365611$951A1FD4-6FB9-4261-AF17-2FC49E943FCE","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1365611$A04EBCB1-FD0A-426F-8945-B4BAD1352AE9","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1365611$286AC08A-26C9-4E53-B45A-BFC39085C0A8","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"2b34da27835420c63f452a2edcc5ccbb08badc2c","datavalue":{"value":"1057464","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1365611$DDA1AF38-6DA9-4CC6-AD6A-4BAEE4EBF251","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"72673ac97426519cbf4390be6951e1b2520429b9","datavalue":{"value":"Santa Barbara, CA (USA)","type":"string"},"datatype":"string"},"type":"statement","id":"Q1365611$BFE5DD6E-A60E-4C74-A1D6-DDE8A614EE2A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q1365611$FFC3567A-D492-4805-BB53-94DEF50B69AE","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q1365611$4A0D9F19-60AF-4993-8149-582BC14B1E48","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q1365611$8BFF5D2F-34E0-497B-A76D-6772255335B5","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"bd454c5bfe3a2f9cdd3f7d14d2d5a282a8789e0f","datavalue":{"value":"CRYPTO '97","type":"string"},"datatype":"string"},"type":"statement","id":"Q1365611$A14856D7-9E2C-461D-B901-15D2E1535175","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1365611$B18BC67A-6EB2-4F31-8648-4D86A6B9F2A3","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"5c5b1b719584ade9483c9e6e709968e31f40c5e9","datavalue":{"value":"https://doi.org/10.1007/bfb0052223","type":"string"},"datatype":"url"},"type":"statement","id":"Q1365611$95EF8195-24E6-4E6F-AF18-8590829F7A29","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"1b8849dff35a114875dfd21d6998686c6f9064d2","datavalue":{"value":"W4317825030","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1365611$EDA767F6-5894-4B5A-8639-E487AB64B2EF","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"2cc9ada57633e166e8ffc1852f250322c75d4051","datavalue":{"value":"10.1007/BFB0052223","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1365611$D5304094-5008-47CB-8AB0-D81911251248","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Advances in Cryptology -- CRYPTO '97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17--21, 1997. Proceedings","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Advances_in_Cryptology_--_CRYPTO_%2797._17th_annual_international_cryptology_conference._Santa_Barbara,_CA,_USA._August_17--21,_1997._Proceedings"}}}}}