{"entities":{"Q5952234":{"pageid":8129036,"ns":120,"title":"Item:Q5952234","lastrevid":40257748,"modified":"2025-02-14T10:07:59Z","type":"item","id":"Q5952234","labels":{"en":{"language":"en","value":"Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9--13, 2001. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1688322"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5952234$8E8C3E32-1B55-43AF-B587-6EF1CEE27A40","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"e3d9352823f925aeedd41b98ce019eb680740f00","datavalue":{"value":{"text":"Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9--13, 2001. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q5952234$FA620F78-96DB-4B79-B84C-9291D73DD509","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"1d527c57e6f61711a3de593b64bf22ba840a9515","datavalue":{"value":"0977.00048","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952234$8D5B1105-B17D-4D5D-A334-F02AD8574CCB","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"fb393e0ee11ea61b329d8e1911fb1892890c802f","datavalue":{"value":"10.1007/3-540-45682-1","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952234$058BAE42-FE48-418B-884C-FCBDE74D6B77","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5952234$B05908FC-67A2-4643-B8AA-A1A260B974C3","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"d99679be6596c8cc4e11d1bbb5f9466f6a2a85c4","datavalue":{"value":{"time":"+2002-01-09T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q5952234$3182C0AF-6721-4643-A690-D011A1EC7269","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"16a2736280fba866d703ba455587c738ab06eda9","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference (6th, 2000) has been reviewed (see Zbl 0952.00064).  Indexed articles:  \\textit{Gentry, Craig; Jonsson, Jakob; Stern, Jacques; Szydlo, Michael}, Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001, 1-20 [Zbl 1062.94547]  \\textit{Nguyen, Phong Q.; Shparlinski, Igor E.}, On the insecurity of a server-aided RSA protocol, 21-35 [Zbl 1062.94551]  \\textit{Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick}, The modular inversion hidden number problem, 36-51 [Zbl 1062.94545]  \\textit{Hopper, Nicholas J.; Blum, Manuel}, Secure human identification protocols, 52-66 [Zbl 1062.94549]  \\textit{Lenstra, Arjen K.}, Unbelievable security, 67-86 [Zbl 1062.94550]  \\textit{M\u00fcller, Siguna}, A probable prime test with very high confidence for \\(n \\equiv 1 \\bmod 4\\), 87-106 [Zbl 1062.11079]  \\textit{Thom\u00e9, Emmanuel}, Computation of discrete logarithms in \\(\\mathbb {F}_{2^{607}}\\), 107-124 [Zbl 1062.11080]  \\textit{Stam, Martijn; Lenstra, Arjen K.}, Speeding up XTR, 125-143 [Zbl 1062.94553]  \\textit{Cha, Jae Choon; Ko, Ki Hyoung; Lee, Sang Jin; Han, Jae Woo; Cheon, Jung Hee}, An efficient implementation of braid groups, 144-156 [Zbl 1062.94546]  \\textit{Courtois, Nicolas T.; Finiasz, Matthieu; Sendrier, Nicolas}, How to achieve a McEliece-based digital signature scheme, 157-174 [Zbl 1062.94556]  \\textit{Silverberg, Alice; Staddon, Jessica; Walker, Judy L.}, Efficient traitor tracing algorithms using list decoding, 175-192 [Zbl 1062.94552]  \\textit{Sugita, Makoto; Kobara, Kazukuni; Imai, Hideki}, Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis, 193-207 [Zbl 1062.94554]  \\textit{Hong, Deukjo; Sung, Jaechul; Hong, Seokhie; Lee, Wonil; Lee, Sangjin; Lim, Jongin; Yi, Okyeon}, Known-IV attacks on triple modes of operation of block ciphers, 208-221 [Zbl 1062.94548]  \\textit{Patarin, Jacques}, Generic attacks on Feistel schemes, 222-238 [Zbl 1064.94550]  \\textit{Satoh, Akashi; Morioka, Sumio; Takano, Kohji; Munetoh, Seiji}, A compact Rijndael hardware architecture with S-Box optimization, 239-254 [Zbl 1067.94563]  \\textit{Kang, Ju-Sung; Shin, Sang-Uk; Hong, Dowon; Yi, Okyeon}, Provable security of KASUMI and 3GPP encryption mode \\(f8\\), 255-271 [Zbl 1064.94547]  \\textit{Wong, Duncan S.; Chan, Agnes H.}, Efficient and mutually authenticated key exchange for low power computing devices, 272-289 [Zbl 1067.94567]  \\textit{Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David}, Provably authenticated group Diffie-Hellman key exchange -- the dynamic case, 290-309 [Zbl 1064.94555]  \\textit{Fouque, Pierre-Alain; Stern, Jacques}, Fully distributed threshold RSA under standard assumptions, 310-330 [Zbl 1067.94531]  \\textit{Lysyanskaya, Anna; Peikert, Chris}, Adaptive security in the threshold setting: From cryptosystems to signature schemes, 331-350 [Zbl 1064.94549]  \\textit{Fouque, Pierre-Alain; Pointcheval, David}, Threshold cryptosystems secure against chosen-ciphertext attacks, 351-368 [Zbl 1064.94545]  \\textit{Chang, Yancheng; Lu, Chijen}, Oblivious polynomial evaluation and oblivious neural learning, 369-384 [Zbl 1064.94543]  \\textit{Liskov, Moses; Lysyanskaya, Anna; Micali, Silvio; Reyzin, Leonid; Smith, Adam}, Mutually independent commitments, 385-401 [Zbl 1064.94557]  \\textit{Courtois, Nicolas T.}, Efficient zero-knowledge authentication based on a linear algebra problem MinRank, 402-421 [Zbl 1064.94544]  \\textit{Cohen, Tzafrir; Kilian, Joe; Petrank, Erez}, Responsive round complexity and concurrent zero knowledge, 422-441 [Zbl 1064.94556]  \\textit{H\u00e5stad, Johan; N\u00e4slund, Mats}, Practical construction and analysis of pseudo-randomness primitives, 442-459 [Zbl 1064.94546]  \\textit{Tarannikov, Yuriy; Korolev, Peter; Botev, Anton}, Autocorrelation coefficients and correlation immunity of Boolean functions, 460-479 [Zbl 1064.94551]  \\textit{Gaudry, Pierrick; G\u00fcrel, Nicolas}, An extension of Kedlaya's point-counting algorithm to superelliptic curves, 480-494 [Zbl 1064.11080]  \\textit{Galbraith, Steven D.}, Supersingular curves in cryptography, 495-513 [Zbl 1064.11079]  \\textit{Boneh, Dan; Lynn, Ben; Shacham, Hovav}, Short signatures from the Weil pairing, 514-532 [Zbl 1064.94554]  \\textit{Verheul, Eric R.}, Self-blindable credential certificates from the Weil pairing, 533-551 [Zbl 1064.94559]  \\textit{Rivest, Ronald L.; Shamir, Adi; Tauman, Yael}, How to leak a secret, 552-565 [Zbl 1064.94558]  \\textit{Bellare, Mihir; Boldyreva, Alexandra; Desai, Anand; Pointcheval, David}, Key-privacy in public-key encryption, 566-582 [Zbl 1064.94553]  \\textit{Abe, Masayuki; Ohkubo, Miyako}, Provably secure fair blind signatures with tight revocation, 583-601 [Zbl 1064.94552]","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952234$1355B223-FA95-4538-BC33-5D5138A98BB3","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952234$B31EAAF4-69C2-4FDC-8FC2-A0C8686CB9F7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952234$F3C410E6-CD9D-45A5-A7CE-72162188FCC8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952234$BDD1B775-ADFE-4077-A4A4-46485167E53D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952234$2C56E85E-3226-411B-995E-5795A373B47E","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"9b42e9a59a9f9176bc70bd2208502ac7eb63341a","datavalue":{"value":"1688322","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952234$84FBB3C8-78BD-4FB4-A569-3E114946E9B5","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"daf8749a35ad5e028758634fc8fd6d8e3d01472a","datavalue":{"value":"Gold coast (Australia)","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952234$DFC469E8-FA69-43AA-90AA-C6038B1EE086","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952234$5365DDD8-8A3C-484F-9BC4-49B8F63C36B2","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952234$CA7935DA-3D99-4AA2-AFE2-ACFFFE59A511","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"3a8545ee1982e5c45be1ad705a09910e2531b2ec","datavalue":{"value":"ASIACRYPT","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952234$3502FD79-13D6-4825-A7CA-E4EA111C2A37","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952234$23173251-610B-42F8-ADB2-1A1C3D172E0C","rank":"normal"}],"P12":[{"mainsnak":{"snaktype":"value","property":"P12","hash":"f5f8f83bf182eab484b37eb896d46c1f89dc5487","datavalue":{"value":"Q21767537","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952234$C4C0B153-90B9-4A96-9C4B-43367D7AF8FD","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5952234$D971F131-E848-4C1A-A45A-1A9B8CBB8BDA","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"59bcd72d19b29aff821cc246e10a45a1b8eb0eb6","datavalue":{"value":"https://doi.org/10.1007/3-540-45682-1","type":"string"},"datatype":"url"},"type":"statement","id":"Q5952234$B34D1CCA-53A3-4191-A94F-72EDE7890DD4","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"02bd65ed9943fa66efa3c303a237e85745cdef79","datavalue":{"value":"W4308661851","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952234$F20C42DA-AA10-4BD5-B71F-C11F58E891C6","rank":"normal"}],"P1635":[{"mainsnak":{"snaktype":"value","property":"P1635","hash":"f2a4bf4409108f0aa2c7b4338318f69388f0c131","datavalue":{"value":"conf/asiacrypt/2001","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952234$216CF9B3-258E-4336-B496-CA4061B0FF41","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:5952234","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:5952234"}}}}}