000 | 03894nam a22004095i 4500 | ||
---|---|---|---|
001 | 297179 | ||
003 | MX-SnUAN | ||
005 | 20160429155411.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2007 gw | o |||| 0|eng d | ||
020 |
_a9783540734895 _99783540734895 |
||
024 | 7 |
_a10.1007/9783540734895 _2doi |
|
035 | _avtls000350596 | ||
039 | 9 |
_a201509030457 _bVLOAD _c201405060237 _dVLOAD _y201402171101 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.A25 | |
100 | 1 |
_aTakagi, Tsuyoshi. _eeditor. _9332756 |
|
245 | 1 | 0 |
_aPairing-Based Cryptography – Pairing 2007 : _bFirst International Conference, Tokyo, Japan, July 2-4, 2007. Proceedings / _cedited by Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2007. |
|
300 |
_axiii, 407 páginas _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v4575 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aInvited Talk I -- Bilinear Groups of Composite Order -- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System -- Practical Time Capsule Signatures in the Standard Model from Bilinear Maps -- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys -- Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles) -- General and Efficient Certificateless Public Key Encryption Constructions -- Invited Talk II -- Hyperelliptic Pairings -- Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2 -- Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians -- Invited Talk III -- Implementing Cryptographic Pairings over Barreto-Naehrig Curves -- Instruction Set Extensions for Pairing-Based Cryptography -- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks -- Protocol I -- Proxy Re-encryption Systems for Identity-Based Encryption -- Fair Blind Signatures Revisited -- Invited Talk IV -- Supersingular Elliptic Curves in Cryptography -- On the Minimal Embedding Field -- Remarks on Cheon’s Algorithms for Pairing-Related Problems -- Invited Talk V -- On Pairing Inversion Problems -- The Tate Pairing Via Elliptic Nets -- Eta Pairing Computation on General Divisors over Hyperelliptic Curves y 2?=?x 7???x ±1 -- Protocol II -- Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length -- Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. | |
520 | _aThis book represents the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in July 2007. The 18 revised full papers presented together with 2 abstracts and 3 full papers of invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topcial sections on applications, certificateless public key encryption, hyperelliptic curves, implementation, cryptographic protocols, cryptanalysis, and cryptographic algorithms. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aOkamoto, Tatsuaki. _eeditor. _9332757 |
|
700 | 1 |
_aOkamoto, Eiji. _eeditor. _9301924 |
|
700 | 1 |
_aOkamoto, Takeshi. _eeditor. _9332758 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783540734888 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-540-73489-5 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c297179 _d297179 |