{"entities":{"Q5930666":{"pageid":8107468,"ns":120,"title":"Item:Q5930666","lastrevid":32961522,"modified":"2024-03-20T01:16:44Z","type":"item","id":"Q5930666","labels":{"en":{"language":"en","value":"Information security and cryptology - ICISC 2000. 3rd international conference, Seoul, Korea, December 8--9, 2000. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1590203"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5930666$5432803C-075D-4C52-9E9F-BBB7AC9E9D1E","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"0cd39c1b2ec2c8259d1455f6bfb9ea10e041e6c1","datavalue":{"value":{"text":"Information security and cryptology - ICISC 2000. 3rd international conference, Seoul, Korea, December 8--9, 2000. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q5930666$CC319606-03C6-4301-B6F5-4D0644249F8D","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"2ae9aa7463c7f6f7fcd864c960e3d790fac252a7","datavalue":{"value":"0960.00059","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5930666$A5C995FF-AB65-4B5A-959B-045A5BDDF22C","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"fdc6ab10de11c0d33e8bcd579d9a2e9f4cb0cbb9","datavalue":{"value":"10.1007/3-540-45247-8","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5930666$E84D50B8-3A5D-4013-BA0A-8672E6EC0F04","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5930666$6F230466-6C47-4101-9829-1936CCFE0634","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"16b0dc5807e43e4f031a01ed1077d5f242406c2a","datavalue":{"value":{"time":"+2001-04-23T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q5930666$40C0579E-F2F3-4D9A-A2CA-677844AF04D6","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"8d1027be1f514506180f8517ea18c575d916c12a","datavalue":{"value":"The articles of mathematical interest will be reviewed individually.  Indexed articles:  \\textit{Kang, Ju-Sung; Chee, Seongtaek; Park, Choonsik}, A note on the higher order differential attack of block ciphers with two-block structures, 1-13 [Zbl 0977.94023]  \\textit{Tanaka, Hidema; Ishii, Chikashi; Kaneko, Toshinobu}, On the strength of KASUMI without FL functions against higher order differential attack, 14-21 [Zbl 0977.94022]  \\textit{Babbage, Steve; Frisch, Laurent}, On MISTY1 higher order differential cryptanalysis, 22-36 [Zbl 0977.94020]  \\textit{Cheon, Dong Hyeon; Hong, Seok Hie; Lee, Sang Jin; Lee, Sung Jae; Park, Kyung Hwan}, Difference distribution attack on DONUT and improved DONUT, 37-48 [Zbl 0977.94017]  \\textit{Zheng, Yuliang; Zhang, Xian-Mo}, New results on correlation immunity, 49-63 [Zbl 0977.94019]  \\textit{Cheon, Jung Hee; Chee, Seongtaek}, Elliptic curves and resilient functions, 64-72 [Zbl 0977.94018]  \\textit{Krovetz, Ted; Rogaway, Phillip}, Fast universal hashing with small keys and no preprocessing: The PolyR construction., 73-79 [Zbl 1037.94543]  \\textit{Miyaji, Atsuko; Nakabayashi, Masaki; Takano, Shunzo}, Characterization of elliptic curve traces under FR-reduction, 90-108 [Zbl 0990.94024]  \\textit{Markowitch, Olivier; Kremer, Steve}, A multi-party optimistic non-repudiation protocol, 109-122 [Zbl 0977.94015]  \\textit{Lee, Byoungcheon; Kim, Kwangjo}, Secure matchmaking protocol, 123-134 [Zbl 0977.94021]  \\textit{Miyazaki, Takeru}, An improved scheme of the Gennaro-Krawczyk-Rabin undeniable signature system based on RSA, 135-149 [Zbl 0977.94046]  \\textit{Kim, Hyun-Jeong; Lim, Jong In; Lee, Dong Hoon}, Efficient and secure member deletion in group signature schemes, 150-161 [Zbl 0977.94045]  \\textit{Bao, Feng; Deng, Robert H.; Feng, Peirong}, An efficient and practical scheme for privacy protection in the e-commerce of digital goods, 162-170 [Zbl 0981.68052]  \\textit{Mu, Yi; Varadharajan, Vijay}, An internet anonymous auction scheme, 171-182 [Zbl 0977.68535]  \\textit{Suzuki, Koutarou; Kobayashi, Kunio; Morita, Hikaru}, Efficient sealed-bid auction using hash chain, 183-191 [Zbl 0977.68536]  \\textit{Park, DongGook; Boyd, Colin; Dawson, Ed}, Micropayments for wireless communications, 192-205 [Zbl 0977.68537]  \\textit{Banks, William D.; Lieman, Daniel; Shparlinski, Igor E.; To, Van Thuong}, Cryptographic applications of sparse polynomials over finite rings, 206-220 [Zbl 0977.94016]  \\textit{Chung, Chanjoo; Choi, Seungbok; Choi, Youngchul; Won, Dongho}, Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors, 221-234 [Zbl 0977.94509]  \\textit{Young, Adam; Yung, Moti}, Hash to the rescue: space minimization for PKI directories, 235-245 [Zbl 0977.94507]  \\textit{Lee, Jae Seung; Kim, Sang Choon; Sohn, Seung Won}, A design of the security evaluation system for decision support in the enterprise network security management, 246-260 [Zbl 0977.68817]","type":"string"},"datatype":"string"},"type":"statement","id":"Q5930666$B90348F4-D302-4766-ACEF-0252ADA6A46B","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5930666$AC4FF081-EE8F-483F-9685-83E376588934","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5930666$1050E764-E744-42B5-BD89-98FA97CC5107","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5930666$B7C79661-D91C-4A5A-AF79-A059AB17D030","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"99716427f4dfa12ce35323ae5512a3b751c876f6","datavalue":{"value":"1590203","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5930666$8A14AE83-EFE5-4A04-BBB5-A5E5D6B45A4C","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"612531a451218c8f4b53ca0bede8684e648a0bcf","datavalue":{"value":"Seoul (Korea)","type":"string"},"datatype":"string"},"type":"statement","id":"Q5930666$AECF7F87-6BB9-488F-A2E1-BF51BE778E31","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q5930666$AF1BEFF1-4FC9-4D36-B4BF-868A59BD6F5A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q5930666$EDB5AD15-D45F-4FFC-8F73-7F3DC07FF2A4","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"ce1cc64de344a70e8e0f74bb1755728de827c24e","datavalue":{"value":"ICISC 2000","type":"string"},"datatype":"string"},"type":"statement","id":"Q5930666$39ED8917-6CE0-4275-AD30-4B0B8CCF31E1","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"8a631b4c31c28ded5d94827388c4651023fe04e9","datavalue":{"value":"Information security","type":"string"},"datatype":"string"},"type":"statement","id":"Q5930666$D46C0AFD-7917-4BC9-B711-4BBA1110AE1C","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q5930666$DB309203-403A-4D54-86FC-FC29057AECA5","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5930666$38936A51-A218-4E08-B436-42C96C2F51DD","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"d2396be630e358d12361735e97a1a5ce32d00a0f","datavalue":{"value":"https://doi.org/10.1007/978-3-540-76788-6","type":"string"},"datatype":"url"},"type":"statement","id":"Q5930666$CF62C897-6737-4B78-8553-CD66610A1D94","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"a10f017491f13d1f591b9009685625ae3d7c9cce","datavalue":{"value":"W2496360257","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5930666$4ADEB70D-7625-4EA9-968B-FBBF169C9A2D","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:5930666","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:5930666"}}}}}