{"entities":{"Q1578448":{"pageid":1589188,"ns":120,"title":"Item:Q1578448","lastrevid":72236625,"modified":"2026-04-14T03:32:15Z","type":"item","id":"Q1578448","labels":{"en":{"language":"en","value":"Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20--24, 2000. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1498567"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1578448$21B96C72-931D-41FF-948C-774AF0554DBA","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"315b353b1a597b61f1a8b126a11a6ae609bff931","datavalue":{"value":{"text":"Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20--24, 2000. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1578448$25FB3741-B571-4FD2-A8F3-4036F85F959E","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"97608955f5e79f72f84b6f0a4be2ec793e6c53c2","datavalue":{"value":"0944.00095","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1578448$76DAC6DD-C028-470B-9F2B-1653D3665A7E","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"f366adea19acfdfcdf9b3aef48239aaa284d2167","datavalue":{"value":"10.1007/3-540-44598-6","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1578448$98E5C23D-C7C9-42D7-87B5-501DDF4D409C","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1578448$5D59B905-2042-484B-89DC-26014CA4BFA0","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"b0df8443dcb0e17ccba33c529b5b66ed23b66916","datavalue":{"value":{"time":"+2000-08-31T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1578448$B37E40FA-FA70-4B62-B6AE-61158C01DCC0","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"096bcee6855aeaa021ffcef3c07fd0b99b69a3f2","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference (19th, 1999) has been reviewed (see Zbl 0921.00042).  Indexed articles:  \\textit{Lenstra, Arjen K.; Verheul, Eric R.}, The XTR public key system, 1-19 [Zbl 0995.94538]  \\textit{Jaulmes, \u00c9liane; Joux, Antoine}, A chosen-ciphertext attack against NTRU, 20-35 [Zbl 0995.94525]  \\textit{Lindell, Yehuda; Pinkas, Benny}, Privacy preserving data mining, 36-54 [Zbl 0989.68506]  \\textit{Beimel, Amos; Ishai, Yuval; Malkin, Tal}, Reducing the servers computation in private information retrieval: PIR with preprocessing, 55-73 [Zbl 0989.68507]  \\textit{Dodis, Yevgeniy; Micali, Silvio}, Parallel reducibility for information-theoretically secure computation, 74-92 [Zbl 0989.68555]  \\textit{Cachin, Christian; Camenisch, Jan}, Optimistic fair secure computation. (Extended abstract), 93-111 [Zbl 0989.68510]  \\textit{Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal}, A cryptographic solution to a game theoretic problem, 112-130 [Zbl 1001.91002]  \\textit{Biehl, Ingrid; Meyer, Bernd; M\u00fcller, Volker}, Differential fault attacks on elliptic curve cryptosystems. (Extended abstract), 131-146 [Zbl 0989.94505]  \\textit{Okamoto, Tatsuaki; Tanaka, Keisuke; Uchiyama, Shigenori}, Quantum public-key cryptosystems, 147-165 [Zbl 0995.94535]  \\textit{Ko, Ki Hyoung; Lee, Sang Jin; Cheon, Jung Hee; Han, Jae Woo; Kang, Ju-sung; Park, Choonsik}, New public-key cryptosystem using braid groups, 166-183 [Zbl 0995.94531]  \\textit{Coppersmith, Don; Knudsen, Lars R.; Mitchell, Chris J.}, Key recovery and forgery attacks on the MacDES MAC algorithm, 184-196 [Zbl 0995.94546]  \\textit{Black, John; Rogaway, Phillip}, CBC MACs for arbitrary-length messages: The three-key constructions, 197-215 [Zbl 0995.94545]  \\textit{Semanko, Michael}, \\(l\\)-collision attacks against randomized MACs, 216-228 [Zbl 0995.94547]  \\textit{Coron, Jean-S\u00e9bastien}, On the exact security of full domain hash, 229-235 [Zbl 0995.94533]  \\textit{Boneh, Dan; Naor, Moni}, Timed commitments. (Extended abstract), 236-254 [Zbl 0989.94517]  \\textit{Ateniese, Giuseppe; Camenisch, Jan; Joye, Marc; Tsudik, Gene}, A practical and provably secure coalition-resistant group signature scheme, 255-270 [Zbl 0995.94544]  \\textit{Abe, Masayuki; Okamoto, Tatsuaki}, Provably secure partially blind signatures, 271-286 [Zbl 0995.94548]  \\textit{Steinwandt, Rainer; Grassl, Markus; Geiselmann, Willi; Beth, Thomas}, Weaknesses in the \\(\\mathrm{SL}_2(\\mathbb F_{2^n})\\) hashing scheme, 287-299 [Zbl 0995.94542]  \\textit{Johansson, Thomas; J\u00f6nsson, Fredrik}, Fast correlation attacks through reconstruction of linear polynomials, 300-315 [Zbl 0995.94523]  \\textit{Safavi-Naini, Reihaneh; Wang, Yejing}, Sequential traitor tracing, 316-332 [Zbl 0995.94536]  \\textit{Garay, Juan A.; Staddon, Jessica; Wool, Avishai}, Long-lived broadcast encryption, 333-352 [Zbl 0995.94529]  \\textit{Abadi, Mart\u00edn}, Taming the adversary, 353-358 [Zbl 0995.94537]  \\textit{Desai, Anand}, The security of all-or-nothing encryption: Protecting against exhaustive key search, 359-375 [Zbl 0995.94539]  \\textit{Ramzan, Zulfikar; Reyzin, Leonid}, On the round security of symmetric-key cryptographic primitives, 376-393 [Zbl 0995.94534]  \\textit{Desai, Anand}, New paradigms for constructing symmetric encryption schemes secure against chosen-ciphertext attack, 394-412 [Zbl 0989.68054]  \\textit{Fischlin, Marc; Fischlin, Roger}, Efficient non-malleable commitment schemes, 413-431 [Zbl 0995.94527]  \\textit{Damg\u00e5rd, Ivan; Nielsen, Jesper Buus}, Improved non-committing encryption schemes based on a general complexity assumption, 432-450 [Zbl 0989.68509]  \\textit{Rosen, Alon}, A note on the round-complexity of concurrent zero-knowledge, 451-468 [Zbl 0989.68053]  \\textit{Gennaro, Rosario}, An improved pseudo-random generator based on discrete log, 469-481 [Zbl 0989.68508]  \\textit{Gisin, Nicolas; Wolf, Stefan}, Linking classical and quantum key agreement: Is there ``bound information''?, 482-500 [Zbl 0995.94528]  \\textit{Zhang, Muxiang; Chan, Agnes}, Maximum correlation analysis of nonlinear S-boxes in stream ciphers, 501-514 [Zbl 0995.94530]  \\textit{Sarkar, Palash; Maitra, Subhamoy}, Nonlinearity bounds and constructions of resilient Boolean functions, 515-532 [Zbl 0995.94532]  \\textit{Bierbrauer, J\u00fcrgen; Schellwat, Holger}, Almost independent and weakly biased arrays: Efficient constructions and cryptologic applications, 533-543 [Zbl 0995.94552]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1578448$52223C11-FBD1-4DB6-9C15-F0FBA43E575F","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1578448$8D5FFAA9-4A1C-4AAD-BA37-0A675BCC6CF5","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1578448$526D0711-BA28-41E2-B132-0AADD28C2E4D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1578448$E642D2C4-7135-47F6-A747-63D390AB8B30","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1578448$E4EC4218-78C0-441A-B286-C56354246802","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1578448$BEF986EF-055E-4DAE-B6EE-BC4640627B17","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"ee57d6807482cefe90e70e3bf08600173d9213ad","datavalue":{"value":"1498567","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1578448$8F26C43C-8DF8-4294-A951-06F34EA668E7","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"72673ac97426519cbf4390be6951e1b2520429b9","datavalue":{"value":"Santa Barbara, CA (USA)","type":"string"},"datatype":"string"},"type":"statement","id":"Q1578448$057EBD3E-5B64-4F56-B1E9-B947BE71066F","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q1578448$0F43BDB2-4228-4685-95AC-725CFE1C3646","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q1578448$EE996947-9466-4DED-BC31-C018CC703FCC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9e313bc7286cff556127b632042102379136bb49","datavalue":{"value":"CRYPTO 2000","type":"string"},"datatype":"string"},"type":"statement","id":"Q1578448$FA3DBB98-D8E2-475E-9E27-E17EF585964B","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q1578448$9179FF91-1AB9-4AE6-BA61-BF699780F51A","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1578448$60AA31FE-55FC-4130-AF98-414FAE96D1B0","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"1d1d1308b4bff3f01cbe43f5f3af7c8aa53d36e6","datavalue":{"value":"https://doi.org/10.1007/3-540-44598-6","type":"string"},"datatype":"url"},"type":"statement","id":"Q1578448$CA88529C-530E-4FA7-80FD-DE65058D73A0","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"3118a2e20a77c407174a6d634f1c3acd6b1c8f2c","datavalue":{"value":"W2480510614","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1578448$FA202F7C-012F-4291-A367-A45907D3D7F6","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20--24, 2000. Proceedings","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Advances_in_cryptology_-_CRYPTO_2000._20th_annual_international_conference,_Santa_Barbara,_CA,_USA,_August_20--24,_2000._Proceedings"}}}}}