Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings

The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Researc...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Lee, Pil Joong
Format: Buch
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume 3329
creator Lee, Pil Joong
description The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers’ names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.
doi_str_mv 10.1007/b104116
format Book
fullrecord <record><control><sourceid>proquest_askew</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9783540305392</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3088242</sourcerecordid><originalsourceid>FETCH-LOGICAL-a36198-ea09c81e8e5a7d466c57f5649ac20f6cb50e91ca03f70a78cbba7e13cc4126d13</originalsourceid><addsrcrecordid>eNpt0E1Lw0AQBuD1k9Za_Au5SBGMzuxu9uMYQ9VCQdEieAqb7aathqRmY6X_3tYUT53LHOZhhnkJuUC4QQB5myFwRHFAzljEgUHEND8kXRSIIWNcH7UDyrSM1DHpbggNteTslHQiiVQJyTuk7_0HbEsrpliXDOLpypTW-WBRBkm9XjZVUc3WQRjEr6M4eXl_ngQUgJ-Tk9wU3vV3vUfe7oeT5DEcPz2MkngcGiZQq9AZ0FahUy4ycsqFsJHMI8G1sRRyYbMInEZrgOUSjFQ2y4x0yKzlSMUUWY9ctYuN_3Q_fl4VjU9Xhcuq6tOnWqr_7-nGXrbWL-tFOXN12iqEdBtZuots4673OFPb-WLl9vFBy5d19fXtfJP-XbeubGpTpMO7hIFSlFP2C448bjA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC3088242</pqid></control><display><type>book</type><title>Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings</title><source>Springer Books</source><creator>Lee, Pil Joong</creator><contributor>Lee, Pil Joong</contributor><creatorcontrib>Lee, Pil Joong ; SpringerLink (Online service) ; Lee, Pil Joong</creatorcontrib><description>The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers’ names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.</description><edition>2004 edition.</edition><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540239758</identifier><identifier>ISBN: 9783540239758</identifier><identifier>ISBN: 3662167433</identifier><identifier>ISBN: 9783662167434</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540305394</identifier><identifier>EISBN: 9783540305392</identifier><identifier>DOI: 10.1007/b104116</identifier><identifier>OCLC: 57128674</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin / Heidelberg</publisher><subject>Algorithm Analysis and Problem Complexity ; Coding and Information Theory ; Coding theory ; Computer Communication Networks ; Computer Science ; Computer security ; Computer software ; Congresses ; Cryptology ; Data encryption (Computer science) ; Information Systems ; Management of Computing and Information Systems ; Operating Systems ; Operating systems (Computers)</subject><creationdate>2004</creationdate><tpages>559</tpages><format>559</format><rights>Springer-Verlag Berlin Heidelberg 2004</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://media.springernature.com/w306/springer-static/cover-hires/book/978-3-540-30539-2</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/b104116$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/b104116$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>306,309,778,782,784,787,4038,27908,38238,41425,42494</link.rule.ids></links><search><contributor>Lee, Pil Joong</contributor><creatorcontrib>Lee, Pil Joong</creatorcontrib><creatorcontrib>SpringerLink (Online service)</creatorcontrib><title>Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings</title><description>The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers’ names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.</description><subject>Algorithm Analysis and Problem Complexity</subject><subject>Coding and Information Theory</subject><subject>Coding theory</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Computer security</subject><subject>Computer software</subject><subject>Congresses</subject><subject>Cryptology</subject><subject>Data encryption (Computer science)</subject><subject>Information Systems</subject><subject>Management of Computing and Information Systems</subject><subject>Operating Systems</subject><subject>Operating systems (Computers)</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540239758</isbn><isbn>9783540239758</isbn><isbn>3662167433</isbn><isbn>9783662167434</isbn><isbn>3540305394</isbn><isbn>9783540305392</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2004</creationdate><recordtype>book</recordtype><sourceid/><recordid>eNpt0E1Lw0AQBuD1k9Za_Au5SBGMzuxu9uMYQ9VCQdEieAqb7aathqRmY6X_3tYUT53LHOZhhnkJuUC4QQB5myFwRHFAzljEgUHEND8kXRSIIWNcH7UDyrSM1DHpbggNteTslHQiiVQJyTuk7_0HbEsrpliXDOLpypTW-WBRBkm9XjZVUc3WQRjEr6M4eXl_ngQUgJ-Tk9wU3vV3vUfe7oeT5DEcPz2MkngcGiZQq9AZ0FahUy4ycsqFsJHMI8G1sRRyYbMInEZrgOUSjFQ2y4x0yKzlSMUUWY9ctYuN_3Q_fl4VjU9Xhcuq6tOnWqr_7-nGXrbWL-tFOXN12iqEdBtZuots4673OFPb-WLl9vFBy5d19fXtfJP-XbeubGpTpMO7hIFSlFP2C448bjA</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Lee, Pil Joong</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope/></search><sort><creationdate>2004</creationdate><title>Advances in Cryptology - ASIACRYPT 2004</title><author>Lee, Pil Joong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a36198-ea09c81e8e5a7d466c57f5649ac20f6cb50e91ca03f70a78cbba7e13cc4126d13</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Algorithm Analysis and Problem Complexity</topic><topic>Coding and Information Theory</topic><topic>Coding theory</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Computer security</topic><topic>Computer software</topic><topic>Congresses</topic><topic>Cryptology</topic><topic>Data encryption (Computer science)</topic><topic>Information Systems</topic><topic>Management of Computing and Information Systems</topic><topic>Operating Systems</topic><topic>Operating systems (Computers)</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lee, Pil Joong</creatorcontrib><creatorcontrib>SpringerLink (Online service)</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lee, Pil Joong</au><au>Lee, Pil Joong</au><aucorp>SpringerLink (Online service)</aucorp><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2004</date><risdate>2004</risdate><volume>3329</volume><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540239758</isbn><isbn>9783540239758</isbn><isbn>3662167433</isbn><isbn>9783662167434</isbn><eisbn>3540305394</eisbn><eisbn>9783540305392</eisbn><abstract>The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers’ names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/b104116</doi><oclcid>57128674</oclcid><tpages>559</tpages><edition>2004 edition.</edition></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof
issn 0302-9743
1611-3349
language eng
recordid cdi_askewsholts_vlebooks_9783540305392
source Springer Books
subjects Algorithm Analysis and Problem Complexity
Coding and Information Theory
Coding theory
Computer Communication Networks
Computer Science
Computer security
Computer software
Congresses
Cryptology
Data encryption (Computer science)
Information Systems
Management of Computing and Information Systems
Operating Systems
Operating systems (Computers)
title Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T22%3A47%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_askew&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Advances%20in%20Cryptology%20-%20ASIACRYPT%202004:%2010th%20International%20Conference%20on%20the%20Theory%20and%20Application%20of%20Cryptology%20and%20Information%20Security,%20Jeju%20Island,%20Korea,%20December%205-9,%202004,%20Proceedings&rft.au=Lee,%20Pil%20Joong&rft.aucorp=SpringerLink%20(Online%20service)&rft.date=2004&rft.volume=3329&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540239758&rft.isbn_list=9783540239758&rft.isbn_list=3662167433&rft.isbn_list=9783662167434&rft_id=info:doi/10.1007/b104116&rft_dat=%3Cproquest_askew%3EEBC3088242%3C/proquest_askew%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540305394&rft.eisbn_list=9783540305392&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3088242&rft_id=info:pmid/&rfr_iscdi=true