{"entities":{"Q1567495":{"pageid":1578235,"ns":120,"title":"Item:Q1567495","lastrevid":72212730,"modified":"2026-04-14T03:22:36Z","type":"item","id":"Q1567495","labels":{"en":{"language":"en","value":"Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14--18, 2000. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1461549"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1567495$A2B9FA30-9848-4AE4-BC07-1DEBF6CA30F4","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"e34448d459342daeb5ac96d7853be91c2ec98355","datavalue":{"value":{"text":"Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14--18, 2000. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1567495$8974B9D9-E202-4AC4-9701-C665AA466BB5","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"9ad7f1481bba316b52ad5cb3b2d816ded951e25f","datavalue":{"value":"0939.00052","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1567495$CA722778-043A-4991-BBE2-9CE807F32141","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"977a14cccde3b8d30bb600ab5e6c30d7dec58617","datavalue":{"value":"10.1007/3-540-45539-6","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1567495$580AA6BE-FB78-4149-9A8D-A22F9D76E1BD","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1567495$A76241C0-0DC2-4B07-B71D-5779DCC02C5F","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"1c095d1fd6a9ad2c3a1058f1f892c0dc8ccec72e","datavalue":{"value":{"time":"+2000-06-20T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1567495$BA53673F-1535-4D2C-BEF8-18B24D2BA9BC","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"b2bfec89e2b6c03a3ce91a01291957d6d09c358a","datavalue":{"value":"The articles of this volume will be reviewed individually. The 17th conference 1999 has been indicated (see Zbl 0912.00038).  Indexed articles:  \\textit{Cavallar, Stefania; Dodsons, Bruce; Lenstra, Arjen K.; Lioen, Walter; Montgomery, Peter L.; Murphy, Brian; te Riele, Herman; Aardal, Karen; Gilchrist, Jeff; Guillerm, G\u00e9rard; Leyland, Paul; Marchand, Jo\u00ebl; Morain, Fran\u00e7ois; Muffett, Alec; Putnam, Chris; Putnam, Craig; Zimmermann, Paul}, Factorization of a 512-bit RSA modulus, 1-18 [Zbl 1082.94511]  \\textit{Gaudry, Pierrick}, An algorithm for solving the discrete log problem on hyperelliptic curves, 19-34 [Zbl 1082.94517]  \\textit{Lenstra, Arjen K.; Shamir, Adi}, Analysis and optimization of the twinkle factoring device, 35-52 [Zbl 1082.94525]  \\textit{Bleichenbacher, Daniel; Nguyen, Phong Q.}, Noisy polynomial interpolation and noisy Chinese remaindering, 53-69 [Zbl 1082.94507]  \\textit{Grieu, Fran\u00e7ois}, A chosen message attack on the ISO/IEC 9796-1 signature scheme, 70-80 [Zbl 1082.94519]  \\textit{Girault, Marc; Misarsky, Jean-Fran\u00e7ois}, Cryptanalysis of countermeasures proposed for repairing ISO 9496-1, 81-90 [Zbl 1082.94518]  \\textit{Coron, Jean-S\u00e9bastien; Naccache, David}, Security analysis of the Gennaro-Halevi-Rabin signature scheme, 91-101 [Zbl 1082.94513]  \\textit{Kushilevitz, Eyal; Ostrovsky, Rafail}, One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval, 104-121 [Zbl 1082.68567]  \\textit{Di Crescenzo, Giovanni; Malkin, Tal; Ostrovsky, Rafail}, Single database private information retrieval implies oblivious transfer, 122-138 [Zbl 1082.68566]  \\textit{Bellare, Mihir; Pointcheval, David; Rogaway, Phillip}, Authenticated key exchange secure against dictionary attacks, 139-155 [Zbl 1082.94533]  \\textit{Boyko, Victor; MacKenzie, Philip; Patel, Savar}, Provably secure password-authenticated key exchange using Diffie-Hellman, 156-171 [Zbl 1082.94535]  \\textit{Poupard, Guillaume; Stern, Jacques}, Fair encryption of RSA keys, 172-189 [Zbl 1082.94528]  \\textit{Catalano, Dario; Gennaro, Rosario; Halevi, Shai}, Computing inverses over a shared secret modulus, 190-206 [Zbl 1082.94538]  \\textit{Shoup, Victor}, Practical threshold signatures, 207-220 [Zbl 1082.94545]  \\textit{Jarecki, Stanis\u0142aw; Lysyanskaya, Anna}, Adaptively secure threshold cryptography: introducing concurrence, removing erasures, 221-242 [Zbl 1082.94522]  \\textit{Camenisch, Jan; Michels, Markus}, Confirmer signature schemes secure against adaptive adversaries, 243-258 [Zbl 1082.94537]  \\textit{Bellare, Mihir; Boldyreva, Alexandra; Micali, Silvio}, Public-key encryption in a multi-user setting: security proofs and improvements, 259-274 [Zbl 1082.94504]  \\textit{Shoup, Victor}, Using hash functions as a hedge against chosen ciphertext attack, 275-288 [Zbl 1082.94530]  \\textit{Brassard, Gilles; L\u00fctkenhaus, Norbert; Mor, Tal; Sanders, Barry C.}, Security aspects of practical quantum cryptography, 289-299 [Zbl 1082.94536]  \\textit{Dumais, Paul; Mayers, Dominic; Salvail, Louis}, Perfectly concealing quantum bit commitment from any quantum one-way permutation, 300-315 [Zbl 1082.94540]  \\textit{Cramer, Ronald; Damg\u00e5rd, Ivan; Maurer, Ueli}, General secure multi-party computation from any linear secret-sharing scheme, 316-334 [Zbl 1082.94515]  \\textit{Beaver, Donald}, Minimal-latency secure function evaluation, 335-350 [Zbl 1082.94532]  \\textit{Maurer, Ueli; Wolf, Stefan}, Information-theoretic key agreement: from weak to strong secret for free, 351-368 [Zbl 1082.94544]  \\textit{Coron, Jean-S\u00e9bastien; Joye, Marc; Nacchache, David; Pailier, Pascal}, New attacks on PKCS\\#1 V1.5 encryption, 369-381 [Zbl 1082.94512]  \\textit{Jaulmes, \u00c9liane; Joux, Antoine}, A NICE cryptanalysis, 382-391 [Zbl 1082.94523]  \\textit{Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi}, Efficient algorithms for solving overdefined systems of multivariate polynomial equations, 392-407 [Zbl 1082.94514]  \\textit{Biham, Eli}, Cryptanalysis of Patarin's 2-round public key system with \\(S\\) boxes (2R), 408-416 [Zbl 1082.94505]  \\textit{Damg\u00e5rd, Ivan}, Efficient concurrent zero-knowledge in the auxiliary string model, 418-430 [Zbl 1082.94539]  \\textit{Boudot, Fabrice}, Efficient proofs that a committed number lies in an interval, 431-444 [Zbl 1082.94534]  \\textit{Shoup, Victor}, A composition theorem for universal one-way hash functions, 445-452 [Zbl 1082.94531]  \\textit{Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai}, Exposure-resilient functions and all-or-nothing transforms, 453-469 [Zbl 1082.94508]  \\textit{Lucks, Stefan}, The sum of PRPs is a secure PRF, 470-484 [Zbl 1082.94526]  \\textit{Sarkar, Palash; Maitra, Subhamoy}, Construction of nonlinear Boolean functions with important cryptographic properties, 485-506 [Zbl 1082.94529]  \\textit{Canteaut, Anne; Carlet, Claude; Charpin, Pascale; Fontaine, Caroline}, Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions, 507-522 [Zbl 1082.94510]  \\textit{Kawamura, Shinichi; Koike, Masanobu; Sano, Fuhimiko; Shimbo, Atsushi}, Cox-Rower architecture for fast parallel Montgomery multiplication, 523-538 [Zbl 1082.94524]  \\textit{Hirt, Martin; Sako, Kazue}, Efficent receipt-free voting based on homomorphic encryption, 539-556 [Zbl 1082.94520]  \\textit{Desmedt, Yvo; Kurosawa, Kaoru}, How to break a practical MIX and design a new one, 557-572 [Zbl 1082.94516]  \\textit{Canteau, Anne; Trabbia, Micha\u00ebl}, Improved fast correlation attacts using parity-check equations of weight 4 and 5, 573-588 [Zbl 1082.94509]  \\textit{Biryukov, Alex; Wagner, David}, Adavanced slide attacks, 598-606 [Zbl 1082.94506]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1567495$B7A97D36-949F-4F44-96D2-DD4B4FE3462A","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1567495$97B91A53-228A-4AF5-A2AF-50C090853D3A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1567495$6F3D3DB8-95C5-4872-A981-963403DDD35D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1567495$5AE6E002-CB16-4214-8118-A7B63BA3F740","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1567495$C926A316-D38F-42AF-B22A-BEA4D2F2BA24","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"9d191fc88731ad03da3c4c465828f1e75932375a","datavalue":{"value":"1461549","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1567495$7AE7F275-AD7A-4BE1-B69E-51F897898B9E","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"231a3be7ab3570eea5b6f33beb4d4a16fcba2ba0","datavalue":{"value":"Bruges (Belgium)","type":"string"},"datatype":"string"},"type":"statement","id":"Q1567495$4499E5AF-ED6E-41C5-BDEE-5CE065213BAE","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q1567495$4918CC98-D7D0-43B8-99E1-601F2826313B","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q1567495$0A3EE682-1582-43F9-99FA-CEA87C55BD63","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"4236708125e2f80665148c86a8dbfaac5d8507b3","datavalue":{"value":"EUROCRYPT 2000","type":"string"},"datatype":"string"},"type":"statement","id":"Q1567495$7639FE5A-AB62-471C-AF31-CB31EAB8DFDC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q1567495$718AD505-ED85-4B5E-BC3C-9E528252BC92","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1567495$07061008-5098-4969-B502-6A0CB5BF8881","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"00857b3c24f798e8da87f75fa4fa7beaf724f477","datavalue":{"value":"https://doi.org/10.1007/3-540-45539-6","type":"string"},"datatype":"url"},"type":"statement","id":"Q1567495$65DA1484-4303-4E95-8BB2-0418E04A51E9","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"0195b97cc3cf5e1c3dec56958bd3e45dce943348","datavalue":{"value":"W2559905450","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1567495$1A6920BA-3794-40CC-87F3-0AD5F06BCB34","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14--18, 2000. Proceedings","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Advances_in_cryptology_-_EUROCRYPT_2000._19th_international_conference_on_the_theory_and_application_of_cryptographic_techniques,_Bruges,_Belgium,_May_14--18,_2000._Proceedings"}}}}}