{"entities":{"Q2488058":{"pageid":2498801,"ns":120,"title":"Item:Q2488058","lastrevid":44185659,"modified":"2025-11-20T16:38:57Z","type":"item","id":"Q2488058","labels":{"en":{"language":"en","value":"Progress in cryptology -- INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004."}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 2198081"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2488058$DE4C2C50-2E19-4F83-89EA-63C53E4AB8CD","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"38213347678bdef50c83e816f27cbcb97039ff98","datavalue":{"value":{"text":"Progress in cryptology -- INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004.","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q2488058$A44EA5B7-0775-4C96-83E4-590DF153209D","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"72bbb5457e68afa52853adba76b97cb97ec1a6de","datavalue":{"value":"1067.94002","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2488058$B0302D3A-74B9-4A6A-9298-A8DB41F75FA5","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2488058$EBBFAB77-7A26-4798-B8D7-522D8F7F841E","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"2c8161240b506a95f024b0718a56f9f3e2b0e7a2","datavalue":{"value":{"time":"+2005-08-23T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q2488058$41349340-D582-48A7-876A-22E869FEAB9A","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"d6cf25e8f8faeaabdf32f0e28195cc4ba8f01f57","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1029.00080).  Indexed articles:  \\textit{Boyd, Colin}, Design of secure key establishment protocols: Successes, failures and prospects, 1-13 [Zbl 1113.94306]  \\textit{Sahai, Amit}, Secure protocols for complex tasks in complex environments, 14-16 [Zbl 1113.94319]  \\textit{Hitchcock, Yvonne; Boyd, Colin; Gonz\u00e1lez Nieto, Juan Manuel}, Tripartite key exchange in the Canetti-Krawczyk proof model, 17-32 [Zbl 1113.94325]  \\textit{Montreuil, Audrey; Patarin, Jacques}, The marriage proposals problem: fair and efficient solution for two-party computations, 33-47 [Zbl 1115.94013]  \\textit{Wang, Guilin; Bao, Feng; Zhou, Jianying}, On the security of a certified e-mail scheme, 48-60 [Zbl 1113.94327]  \\textit{Peng, Kun; Aditya, Riza; Boyd, Colin; Dawson, Ed; Lee, Byoungcheon}, Multiplicative homomorphic e-voting, 61-72 [Zbl 1113.94318]  \\textit{Zhang, Bin; Wu, Hongjun; Feng, Dengguo; Bao, Feng}, Chosen ciphertext attack on a new class of self-synchronizing stream ciphers, 73-83 [Zbl 1113.94322]  \\textit{Batten, Lynn Margaret}, Algebraic attacks over \\(\\text{GF}(q)\\), 84-91 [Zbl 1115.94005]  \\textit{Dalai, Deepak Kumar; Gupta, Kishan Chand; Maitra, Subhamoy}, Results on algebraic immunity for cryptographically significant Boolean functions, 92-106 [Zbl 1115.94007]  \\textit{Poinsot, Laurent; Harari, Sami}, Generalized Boolean bent functions, 107-119 [Zbl 1115.94010]  \\textit{Braeken, An; Nikov, Ventzislav; Nikova, Svetla; Preneel, Bart}, On Boolean functions with generalized cryptographic properties, 120-135 [Zbl 1115.94006]  \\textit{Vora, Poorvi L.}, Information theory and the security of binary data perturbation, 136-147 [Zbl 1113.68391]  \\textit{McAven, Luke; Safavi-Naini, Reihaneh; Yung, Moti}, Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption, 148-161 [Zbl 1113.94314]  \\textit{Nakahara J\u00fanior, Jorge}, Faster variants of the MESH block ciphers, 162-174 [Zbl 1113.94316]  \\textit{Kim, Jongsung; Kim, Guil; Lee, Sangjin; Lim, Jongin; Song, Junghwan}, Related-key attacks on reduced rounds of SHACAL-2, 175-190 [Zbl 1113.94311]  \\textit{Ko, Youngdai; Lee, Changhoon; Hong, Seokhie; Sung, Jaechul; Lee, Sangjin}, Related-key attacks on DDP based ciphers: CIKS-128 and CIKS-128H, 191-205 [Zbl 1113.94312]  \\textit{Nakahara J\u00fanior, Jorge; Santana de Freitas, Daniel}, Cryptanalysis of Ake98, 206-217 [Zbl 1113.94317]  \\textit{Berger, Thierry; Loidreau, Pierre}, Designing an efficient and secure public-key cryptosystem based on reducible rank codes, 218-229 [Zbl 1113.94305]  \\textit{Sarkar, Palash}, HEAD: Hybrid encryption with delegated decryption capability, 230-244 [Zbl 1113.94320]  \\textit{Galindo, David; Mart\u00edn, Sebasti\u00e0; Takagi, Tsuyoshi; Villar, Jorge L.}, A provably secure elliptic curve scheme with fast encryption, 245-259 [Zbl 1115.94009]  \\textit{Avoine, Gildas; Monnerat, Jean; Peyrin, Thomas}, Advances in alternative non-adjacent form representations, 260-274 [Zbl 1115.94004]  \\textit{Levy-dit-Vehel, Fran\u00e7oise; Perret, Ludovic}, Attacks on public key cryptosystems based on free partially commutative monoids and groups, 275-289 [Zbl 1113.94313]  \\textit{Sato, Hisayoshi; Schepers, Daniel; Takagi, Tsuyoshi}, Exact analysis of Montgomery multiplication, 290-304 [Zbl 1115.94012]  \\textit{Gopalkrishna Gadiyar, H.; Sangeeta Maini, K. M.; Padma, R.}, Cryptography, connections, cocycles and crystals: a \\(p\\)-adic exploration of the discrete logarithm problem, 305-314 [Zbl 1115.94008]  \\textit{Halevi, Shai}, EME*: Extending EME to handle arbitrary-length messages with associated data, 315-327 [Zbl 1113.94310]  \\textit{Chang, Donghoon; Lee, Wonil; Hong, Seokhie; Sung, Jaechul; Lee, Sangjin; Sung, Soohak}, Impossibility of construction of OWHF and UOWHF from PGV model based on block cipher secure against ACPCA, 328-342 [Zbl 1113.94307]  \\textit{McGrew, David A.; Viega, John}, The security and performance of the Galois/counter mode (GCM) of operation, 343-355 [Zbl 1113.94315]  \\textit{Herranz, Javier; S\u00e1ez, Germ\u00e1n}, Revisiting fully distributed proxy signature schemes, 356-370 [Zbl 1113.94324]  \\textit{Chen, Xiaofeng; Zhang, Fangguo; Konidala, Divyan M.; Kim, Kwangjo}, New ID-based threshold signature scheme from bilinear pairings, 371-383 [Zbl 1113.94308]  \\textit{Tsang, Patrick P.; Wei, Victor K.; Chan, Tony K.; Au, Man Ho; Liu, Joseph K.; Wong, Duncan S.}, Separable linkable threshold ring signatures, 384-398 [Zbl 1113.94326]  \\textit{Adhikari, Avishek; Dutta, Tridib Kumar; Roy, Bimal}, A new black and white visual cryptographic scheme for general access structures, 399-413 [Zbl 1113.94323]  \\textit{Fernandez, Marcel; Soriano, Miguel}, Identification algorithms for sequential traitor tracing, 414-429 [Zbl 1113.94309]","type":"string"},"datatype":"string"},"type":"statement","id":"Q2488058$BC57EA96-EF85-46E0-9EF5-772EDF8661FA","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2488058$111018B2-DB9F-4637-B90D-D614F23C8D50","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2488058$32AFC74D-E714-46B7-A3EE-2BB461AA6371","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2488058$0A359EFA-9414-49A7-B490-24AED753D3AA","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"f8865fec806637b7ae938a191a7eea95f113240c","datavalue":{"value":"2198081","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2488058$5EC8F5F7-9F5B-437A-A45B-C8746A97BD49","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2488058$74090C59-DF2E-4BD1-A634-0D27023AD0E3","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:2488058","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:2488058"}}}}}