{"entities":{"Q5933585":{"pageid":8110387,"ns":120,"title":"Item:Q5933585","lastrevid":25458101,"modified":"2024-03-04T22:42:15Z","type":"item","id":"Q5933585","labels":{"en":{"language":"en","value":"Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6--10, 2001. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1599481"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5933585$B68A3439-2855-4252-A67D-1A03DFA45350","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"28a1d523e623580008f8a1960c2fab3c45a120a3","datavalue":{"value":{"text":"Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6--10, 2001. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q5933585$4DD86D4C-9C06-4900-9910-74CA0289E0A7","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"6bc2a5f1294a426674a062a1dfc002d09907654e","datavalue":{"value":"0961.00037","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5933585$E464642F-6DF0-4177-8E2A-268975611164","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5933585$62DE30C5-AA28-4A9F-B9BF-013A7E859EEA","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"82146a8074a40d7249ebefe93809b550846d3a01","datavalue":{"value":{"time":"+2001-05-16T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q5933585$F69F9038-7FDB-4675-9CBA-74267D3D6654","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"cbfce931b19896ab0372964973b9ad381901a18b","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference (19th, 2000) has been reviewed (see Zbl 0939.00052).  Indexed articles:  \\textit{Vercauteren, Frederik; Preneel, Bart; Vandewalle, Joos}, A memory efficient version of Satoh's algorithm, 1-13 [Zbl 1009.11052]  \\textit{Fouquet, Mireille; Gaudry, Pierrick; Harley, Robert}, Finding secure curves with the Satoh-FGH algorithm and an early-abort strategy, 14-29 [Zbl 1010.94554]  \\textit{Smart, Nigel P.}, How secure are elliptic curves over composite extension fields?, 30-39 [Zbl 0981.94011]  \\textit{Di Crescenzo, Giovanni; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam}, Efficient and non-interactive non-malleable commitment, 40-59 [Zbl 0981.94035]  \\textit{Cr\u00e9peau, Claude; L\u00e9gar\u00e9, Fr\u00e9d\u00e9ric; Salvail, Louis}, How to convert the flavor of a quantum bit commitment, 60-77 [Zbl 0981.94012]  \\textit{Katz, Jonathan; Myers, Steven; Ostrovsky, Rafail}, Cryptographic counters and applications to electronic voting, 78-92 [Zbl 0981.94033]  \\textit{Camenisch, Jan; Lysyanskaya, Anna}, An efficient system for non-transferable anonymous credentials with optional anonymity revocation, 93-118 [Zbl 0981.94043]  \\textit{Aiello, Bill; Ishai, Yuval; Reingold, Omer}, Priced oblivious transfer: how to sell digital goods, 119-135 [Zbl 0981.94042]  \\textit{Abe, Masayuki}, A secure three-move blind signature scheme for polynomially many signatures, 136-151 [Zbl 0981.94031]  \\textit{Damg\u00e5rd, Ivan; Koprowski, Maciej}, Practical threshold RSA signatures without a trusted dealer, 152-165 [Zbl 0981.94041]  \\textit{Mironov, Ilya}, Hash functions: from Merkle-Damg\u00e5rd to Shoup, 166-181 [Zbl 0981.94010]  \\textit{Gentry, Craig}, Key recovery and message attacks on NTRU-composite, 182-194 [Zbl 0981.94013]  \\textit{Verheul, Eric R.}, Evidence that XTR is more secure than supersingular elliptic curve cryptosystems, 195-210 [Zbl 0981.94009]  \\textit{Hoffstein, Jeffrey; Pipher, Jill; Silverman, Joseph H.}, NSS: an NTRU lattice-based signature scheme, 211-228 [Zbl 0981.94039]  \\textit{Catalano, Dario; Gennaro, Rosario; Howgrave-Graham, Nick}, The bit security of Paillier's encryption scheme and its applications, 229-243 [Zbl 0981.94016]  \\textit{Sadeghi, Ahmad-Reza; Steiner, Michael}, Assumptions related to discrete logarithms: Why subtleties make a real difference, 244-261 [Zbl 0981.94018]  \\textit{Canetti, Ran; Damg\u00e5rd, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal}, On adaptive vs. non-adaptive security of multiparty protocols, 262-279 [Zbl 0981.94040]  \\textit{Cramer, Ronald; Damg\u00e5rd, Ivan; Nielsen, Jesper B.}, Multiparty computation from threshold homomorphic encryption, 280-300 [Zbl 1010.94553]  \\textit{Dodis, Yevgeniy; Sahai, Amit; Smith, Adam}, On perfect and adaptive security in exposure-resilient cryptography, 301-324 [Zbl 0981.94014]  \\textit{K\u00fchn, Ulrich}, Cryptanalysis of reduced-round MISTY, 325-339 [Zbl 1009.94570]  \\textit{Biham, Eli; Dunkelman, Orr; Keller, Nathan}, The rectangle attack -- rectangling the Serpent, 340-357 [Zbl 0981.94017]  \\textit{Myers, Steven}, Efficient amplification of the security of weak pseudo-random function generators, 358-372 [Zbl 0981.94019]  \\textit{Micali, Silvio; Reyzin, Leonid}, Min-round resettable zero-knowledge in the public-key model, 373-393 [Zbl 0981.94038]  \\textit{Biryukov, Alex; Shamir, Adi}, Structural cryptanalysis of SASAS, 394-405 [Zbl 0981.94015]  \\textit{Youssef, Amr M.; Gong, Guang}, Hyper-bent functions, 406-419 [Zbl 1013.94544]  \\textit{Keliher, Liam; Meijer, Henk; Tavares, Stafford}, New method for upper bounding the maximum average linear hull probability for SPNs, 420-436 [Zbl 1015.94546]  \\textit{Boneh, Dan; Durfee, Glenn; Franklin, Matt}, Lower bounds for multicast message authentication, 437-452 [Zbl 0981.94037]  \\textit{Canetti, Ran; Krawczyk, Hugo}, Analysis of key-exchange protocols and their use for building secure channels, 453-474 [Zbl 0981.94032]  \\textit{Katz, Jonathan; Ostrovsky, Rafail; Yung, Moti}, Efficient password-authenticated key exchange using human-memorable passwords, 475-494 [Zbl 1010.94555]  \\textit{Bellare, Mihir; Fischlin, Marc; Goldwasser, Shafi; Micali, Silvio}, Identification protocols secure against reset attacks, 495-511 [Zbl 1012.94554]  \\textit{An, Jee Hea; Bellare, Mihir}, Does encryption with redundancy provide authenticity?, 512-528 [Zbl 0981.94034]  \\textit{Jutla, Charanjit S.}, Encryption modes with almost free message integrity, 529-544 [Zbl 0981.94036]","type":"string"},"datatype":"string"},"type":"statement","id":"Q5933585$558B3CB8-932D-4136-B43B-3ED3FA3967A2","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5933585$7C008C02-0809-4AB8-BF7B-3395EF7CF651","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5933585$A2C60800-6C95-47E8-87C1-47F97F728648","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"485b4563dc26468b186e971ddb154379b592f65c","datavalue":{"value":"1599481","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5933585$A9E4C1C8-7F9C-4D79-ACC1-96DEECF6AF29","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"7f7dfd990c170cf30c83c222981f153862b914c7","datavalue":{"value":"Innsbruck (Austria)","type":"string"},"datatype":"string"},"type":"statement","id":"Q5933585$75C4E54D-AE95-4BF1-9562-B12A9596BCD8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q5933585$C494AE45-A0AE-42DC-B295-94FD00E60B5F","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q5933585$47FA4C62-2BA9-4A24-9344-12A3C8CCA667","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"36dcb044122236c432116487ea1c81ce0e420e73","datavalue":{"value":"EUROCRYPT 2001","type":"string"},"datatype":"string"},"type":"statement","id":"Q5933585$B49E78B6-2DB8-48D3-89B6-71F523DC13E7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"561016807f4a34e703288f83863c0075e924e39f","datavalue":{"value":"Cryptographic techniques","type":"string"},"datatype":"string"},"type":"statement","id":"Q5933585$C9950FCF-2141-4CAC-BDFC-5B3A6CAE7DF3","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5933585$CC62FFC9-B97B-4EEF-8E66-16321A7E1854","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:5933585","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:5933585"}}}}}