Limit this search to....

Advances in Cryptology - Asiacrypt 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Jap 2000 Edition
Contributor(s): Okamoto, Tatsuaki (Editor)
ISBN: 3540414045     ISBN-13: 9783540414049
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Paperback - Other Formats
Published: November 2000
Qty:
Annotation: This collection of lecture notes in computer science focuses on the proceedings of the 6th International Conference on the theory and application of Cryptology and Information Security, held in Kyoto, Japan.
Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Medical
- Computers | Data Processing
Dewey: 005.8
LCCN: 2001017012
Series: Lecture Notes in Computer Science
Physical Information: 1.3" H x 8.5" W x 11" (3.26 lbs) 636 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
ASIACRYPT 2000 was the sixth annual ASIACRYPT conference. It was sp- sored by the International Association for Cryptologic Research (IACR) in - operation with the Institute of Electronics, Information, and Communication Engineers (IEICE). The ?rst conference with the name ASIACRYPT took place in 1991, and the series of ASIACRYPT conferences were held in 1994, 1996, 1998, and 1999, in cooperation with IACR. ASIACRYPT 2000 was the ?rst conference in the series to be sponsored by IACR. The conference received 140 submissions (1 submission was withdrawn by the authors later), and the program committee selected 45 of these for presen- tion. Extended abstracts of the revised versions of these papers are included in these proceedings. The program also included two invited lectures by Thomas Berson (Cryptography Everywhere: IACR Distinguished Lecture) and Hideki Imai (CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government). Abstracts of these talks are included in these proce- ings. The conference program also included its traditional "rump session" of short, informal or impromptu presentations, kindly chaired by Moti Yung. Those p- sentations are not re?ected in these proceedings. The selection of the program was a challenging task as many high quality submissions were received. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryptography. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection.