Falls Sie nur an einem bestimmten Exempar interessiert sind, können Sie aus der folgenden Liste jenes wählen, an dem Sie interessiert sind:
Nur diese Ausgabe anzeigen…
Nur diese Ausgabe anzeigen…
Nur diese Ausgabe anzeigen…
Nur diese Ausgabe anzeigen…
Advances in Cryptology - CRYPTO '94: 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25
16 Angebote vergleichen
Preise | 2013 | 2015 | 2016 | 2018 | 2021 |
---|---|---|---|---|---|
Schnitt | € 430,80 | € 90,52 | € 74,70 | € 41,42 | € 64,55 |
Nachfrage |
Advances in Cryptology - Crypto 94: 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 Proceedings (Paperback) (1994)
ISBN: 9783540583332 bzw. 3540583335, in Deutsch, Springer-Verlag Berlin and Heidelberg GmbH Co. KG, Germany, Taschenbuch, neu, Nachdruck.
Von Händler/Antiquariat, The Book Depository EURO [60485773], Slough, United Kingdom.
Language: English Brand New Book ***** Print on Demand *****.The CRYPTO 94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered by the Program Committee. Of these, 1 was withdrawn and 38 were selected for the proce- ings. There are also 3 invited talks. Two of these are on aspects of cryptog- phy in the commercial world. The one on hardware aspects will be presented by David Maher (ATT), the one on software aspects by Joseph Pato (Hewlett- Packard). There will also be a panel discussion on Securing an Electronic World: Are We Ready? The panel members will be: Ross Anderson, Bob Blakley, Matt Blaze, George Davida, Yvo Desmedt (moderator), Whitfield Diffie, Joan Feig- baum, Blake Greenlee, Martin Hellman, David Maher, Miles Smid. The topic of the panel will be introduced by the invited talk of Whitfield Diffie on Securing the Information Highway. These proceedings contain revised versions of the 38 contributed talks. Each i paper was sent to at least 3 members of the program committee for comments.
Advances in Cryptology - CRYPTO '94 (1994)
ISBN: 9783540583332 bzw. 3540583335, in Deutsch, Springer Aug 1994, Taschenbuch, neu, Nachdruck.
Von Händler/Antiquariat, AHA-BUCH GmbH [51283250], Einbeck, Germany.
This item is printed on demand - Print on Demand Neuware - The CRYPTO 94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered by the Program Committee. Of these, 1 was withdrawn and 38 were selected for the proce- ings. There are also 3 invited talks. Two of these are on aspects of cryptog- phy in the commercial world. The one on hardware aspects will be presented by David Maher (AT&T), the one on software aspects by Joseph Pato (Hewlett- Packard). There will also be a panel discussion on Securing an Electronic World: Are We Ready The panel members will be: Ross Anderson, Bob Blakley, Matt Blaze, George Davida, Yvo Desmedt (moderator), Whitfield Diffie, Joan Feig- baum, Blake Greenlee, Martin Hellman, David Maher, Miles Smid. The topic of the panel will be introduced by the invited talk of Whitfield Diffie on Securing the Information Highway. These proceedings contain revised versions of the 38 contributed talks. Each i paper was sent to at least 3 members of the program committee for comments. 438 pp. Englisch.
Advances in Cryptology - CRYPTO '94: 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25 (1994)
ISBN: 9783540583332 bzw. 3540583335, vermutlich in Englisch, Springer, Berlin/Heidelberg, Deutschland, neu.
The CRYPTO ''94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered by the Program Committee. Of these, 1 was withdrawn and 38 were selected for the proce- ings. There are also 3 invited talks. Two of these are on aspects of cryptog- phy in the commercial world. The one on hardware aspects will be presented by David Maher (AT&T), the one on software aspects by Joseph Pato (Hewlett- Packard). There will also be a panel discussion on "Securing an Electronic World: Are We Ready?" The panel members will be: Ross Anderson, Bob Blakley, Matt Blaze, George Davida, Yvo Desmedt (moderator), Whitfield Diffie, Joan Feig- baum, Blake Greenlee, Martin Hellman, David Maher, Miles Smid. The topic of the panel will be introduced by the invited talk of Whitfield Diffie on "Securing the Information Highway. " These proceedings contain revised versions of the 38 contributed talks. Each i paper was sent to at least 3 members of the program committee for comments.
Advances in cryptology, CRYPTO '94 :; 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 : proceedings (1994)
ISBN: 9783540583332 bzw. 3540583335, in Deutsch, Springer-Verlag, Taschenbuch.
Von Händler/Antiquariat, Owl & Company Bookshop (Calvello Books).
Berlin: Springer-Verlag, 1994. First edition (presumed; no earlier dates stated). Paperback. Extremely little wear to spine head & foot, bottom corners slightly creased, light edgewear, faint sticker residue to front cover, else very good.. Grey-silver octavo; xii, 438 p, b&w illus ; 24 cm. Contents: The first experimental cryptanalysis of the Data Encryption Standard / Mitsuru Matsui -- Linear cryptanalysis of the Fast Data Encipherment Algorithm / Kazuo Ohta and Kazumaro Aoki -- Differential-linear cryptanalysis / Susan K. Langford and Martin E. Hellman -- Linear cryptanalysis using multiple approximations / Burton S. Kaliski, Jr. and M.J.B. Robshaw -- Hashing with SL[subscript 2] / Jean-Pierre Tillich and Gilles Zemor -- Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks / Jinhui Chao, Kazuo Tanada and Shigeo Tsujii -- Cryptographic protocols based on discrete logarithms in real-quadratic orders / Ingrid Biehl, Johannes Buchmann and Christoph Thiel -- Designated confirmer signatures and public-key encryption are equivalent / Tatsuaki Okamoto -- Directed acyclic graphs, one-way functions and digital signatures / Daniel Bleichenbacher and Ueli M. Maurer.; An identity-based signature scheme with bounded life-span / Olivier Delos and Jean-Jacques Quisquater -- More flexible exponentiation with precomputation / Chae Hoon Lim and Pil Joong Lee -- A parallel permutation multiplier for a PGM crypto-chip / Tamas Horvath, Spyros S. Magliveras and Tran van Trung -- Cryptographic randomness from air turbulence in disk drives / Don Davis, Ross Ihaka and Philip Fenstermacher -- Cryptanalysis of the Gemmell and Naor multiround authentication protocol / Christian Gehrmann -- LFSR-based hashing and authentication / Hugo Krawczyk -- New bound on authentication code with arbitration / Kaoru Kurosawa -- Multi-secret sharing schemes / Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia and Ugo Vaccaro -- Designing identification schemes with keys of short size / Jacques Stern -- Proofs of partial knowledge and simplified design of witness hiding protocols / Ronald Cramer, Ivan Damgard and Berry Schoenmakers.; Language dependent secure bit commitment / Toshiya Itoh, Yuji Ohta and Hiroki Shizuya -- On the length of cryptographic hash-values used in identification schemes / Marc Girault and Jacques Stern -- Incremental cryptography: the case of hashing and signing / Mihir Bellare, Oded Goldreich and Shafi Goldwasser -- An efficient existentially unforgeable signature scheme and its applications / Cynthia Dwork and Moni Naor -- Bounds for resilient functions and orthogonal arrays / Jurgen Bierbrauer, K. Gopalakrishnan and D.R. Stinson -- Tracing traitors / Benny Chor, Amos Fiat and Moni Naor -- Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms / Ueli M. Maurer -- Fast generation of provable primes using search in arithmetic progressions / Preda Mihailescu -- Attack on the cryptographic scheme NIKS-TAS / Don Coppersmith -- On the risk of opening distributed keys / Mike Burmester.; Cryptanalysis of cryptosystems based on remote chaos replication / Th. Beth, D.E. Lazic and A. Mathias -- A Fourier transform approach to the linear complexity of nonlinearly filtered sequences / James L. Massey and Shirlei Sercouek -- The security of cipher block chaining / Mihir Bellare, Joe Kilian and Phillip Rogaway -- A chosen plaintext attack of the 16-round Khufu cryptosystem / Henri Gilbert and Pascal Chauvaud -- Ciphertext only attack for one-way function of the MAP using one ciphertext / Yukiyasu Tsunoo, Eiji Okamoto and Tomohiko Uyematsu -- Pitfalls in designing substitution boxes / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng -- A randomness-rounds tradeoff in private computation / Eyal Kushilevitz and Adi Rosen -- Secure voting using partially compatible homomorphisms / Kazue Sako and Joe Kilian -- Maintaining security in the presence of transient faults / Ran Canetti and Amir Herzberg. || Computers; Technology.
Advances in cryptology, CRYPTO '94 :; 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 : proceedings (1994)
ISBN: 9783540583332 bzw. 3540583335, in Deutsch, Springer-Verlag, Taschenbuch, Erstausgabe.
Von Händler/Antiquariat, Owl & Company Bookshop.
Berlin: Springer-Verlag, 1994. First edition (presumed; no earlier dates stated). Paperback. Extremely little wear to spine head & foot, bottom corners slightly creased, light edgewear, faint sticker residue to front cover, else very good.. Grey-silver octavo; xii, 438 p, b&w illus ; 24 cm. Contents: The first experimental cryptanalysis of the Data Encryption Standard / Mitsuru Matsui -- Linear cryptanalysis of the Fast Data Encipherment Algorithm / Kazuo Ohta and Kazumaro Aoki -- Differential-linear cryptanalysis / Susan K. Langford and Martin E. Hellman -- Linear cryptanalysis using multiple approximations / Burton S. Kaliski, Jr. and M.J.B. Robshaw -- Hashing with SL[subscript 2] / Jean-Pierre Tillich and Gilles Zemor -- Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks / Jinhui Chao, Kazuo Tanada and Shigeo Tsujii -- Cryptographic protocols based on discrete logarithms in real-quadratic orders / Ingrid Biehl, Johannes Buchmann and Christoph Thiel -- Designated confirmer signatures and public-key encryption are equivalent / Tatsuaki Okamoto -- Directed acyclic graphs, one-way functions and digital signatures / Daniel Bleichenbacher and Ueli M. Maurer.; An identity-based signature scheme with bounded life-span / Olivier Delos and Jean-Jacques Quisquater -- More flexible exponentiation with precomputation / Chae Hoon Lim and Pil Joong Lee -- A parallel permutation multiplier for a PGM crypto-chip / Tamas Horvath, Spyros S. Magliveras and Tran van Trung -- Cryptographic randomness from air turbulence in disk drives / Don Davis, Ross Ihaka and Philip Fenstermacher -- Cryptanalysis of the Gemmell and Naor multiround authentication protocol / Christian Gehrmann -- LFSR-based hashing and authentication / Hugo Krawczyk -- New bound on authentication code with arbitration / Kaoru Kurosawa -- Multi-secret sharing schemes / Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia and Ugo Vaccaro -- Designing identification schemes with keys of short size / Jacques Stern -- Proofs of partial knowledge and simplified design of witness hiding protocols / Ronald Cramer, Ivan Damgard and Berry Schoenmakers.; Language dependent secure bit commitment / Toshiya Itoh, Yuji Ohta and Hiroki Shizuya -- On the length of cryptographic hash-values used in identification schemes / Marc Girault and Jacques Stern -- Incremental cryptography: the case of hashing and signing / Mihir Bellare, Oded Goldreich and Shafi Goldwasser -- An efficient existentially unforgeable signature scheme and its applications / Cynthia Dwork and Moni Naor -- Bounds for resilient functions and orthogonal arrays / Jurgen Bierbrauer, K. Gopalakrishnan and D.R. Stinson -- Tracing traitors / Benny Chor, Amos Fiat and Moni Naor -- Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms / Ueli M. Maurer -- Fast generation of provable primes using search in arithmetic progressions / Preda Mihailescu -- Attack on the cryptographic scheme NIKS-TAS / Don Coppersmith -- On the risk of opening distributed keys / Mike Burmester.; Cryptanalysis of cryptosystems based on remote chaos replication / Th. Beth, D.E. Lazic and A. Mathias -- A Fourier transform approach to the linear complexity of nonlinearly filtered sequences / James L. Massey and Shirlei Sercouek -- The security of cipher block chaining / Mihir Bellare, Joe Kilian and Phillip Rogaway -- A chosen plaintext attack of the 16-round Khufu cryptosystem / Henri Gilbert and Pascal Chauvaud -- Ciphertext only attack for one-way function of the MAP using one ciphertext / Yukiyasu Tsunoo, Eiji Okamoto and Tomohiko Uyematsu -- Pitfalls in designing substitution boxes / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng -- A randomness-rounds tradeoff in private computation / Eyal Kushilevitz and Adi Rosen -- Secure voting using partially compatible homomorphisms / Kazue Sako and Joe Kilian -- Maintaining security in the presence of transient faults / Ran Canetti and Amir Herzberg. || Computers; Technology.
Advances in cryptology, CRYPTO '94 :; 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 : proceedings (1994)
ISBN: 9783540583332 bzw. 3540583335, vermutlich in Englisch, Springer-Verlag, Taschenbuch, Erstausgabe.
Von Händler/Antiquariat, Calvello Books (formerly Owl & Company Bookshop).
Berlin: Springer-Verlag, 1994. First edition (presumed; no earlier dates stated). Paperback. Extremely little wear to spine head & foot, bottom corners slightly creased, light edgewear, faint sticker residue to front cover, else very good.. Grey-silver octavo; xii, 438 p, b&w illus ; 24 cm. Contents: The first experimental cryptanalysis of the Data Encryption Standard / Mitsuru Matsui -- Linear cryptanalysis of the Fast Data Encipherment Algorithm / Kazuo Ohta and Kazumaro Aoki -- Differential-linear cryptanalysis / Susan K. Langford and Martin E. Hellman -- Linear cryptanalysis using multiple approximations / Burton S. Kaliski, Jr. and M.J.B. Robshaw -- Hashing with SL[subscript 2] / Jean-Pierre Tillich and Gilles Zemor -- Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks / Jinhui Chao, Kazuo Tanada and Shigeo Tsujii -- Cryptographic protocols based on discrete logarithms in real-quadratic orders / Ingrid Biehl, Johannes Buchmann and Christoph Thiel -- Designated confirmer signatures and public-key encryption are equivalent / Tatsuaki Okamoto -- Directed acyclic graphs, one-way functions and digital signatures / Daniel Bleichenbacher and Ueli M. Maurer.; An identity-based signature scheme with bounded life-span / Olivier Delos and Jean-Jacques Quisquater -- More flexible exponentiation with precomputation / Chae Hoon Lim and Pil Joong Lee -- A parallel permutation multiplier for a PGM crypto-chip / Tamas Horvath, Spyros S. Magliveras and Tran van Trung -- Cryptographic randomness from air turbulence in disk drives / Don Davis, Ross Ihaka and Philip Fenstermacher -- Cryptanalysis of the Gemmell and Naor multiround authentication protocol / Christian Gehrmann -- LFSR-based hashing and authentication / Hugo Krawczyk -- New bound on authentication code with arbitration / Kaoru Kurosawa -- Multi-secret sharing schemes / Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia and Ugo Vaccaro -- Designing identification schemes with keys of short size / Jacques Stern -- Proofs of partial knowledge and simplified design of witness hiding protocols / Ronald Cramer, Ivan Damgard and Berry Schoenmakers.; Language dependent secure bit commitment / Toshiya Itoh, Yuji Ohta and Hiroki Shizuya -- On the length of cryptographic hash-values used in identification schemes / Marc Girault and Jacques Stern -- Incremental cryptography: the case of hashing and signing / Mihir Bellare, Oded Goldreich and Shafi Goldwasser -- An efficient existentially unforgeable signature scheme and its applications / Cynthia Dwork and Moni Naor -- Bounds for resilient functions and orthogonal arrays / Jurgen Bierbrauer, K. Gopalakrishnan and D.R. Stinson -- Tracing traitors / Benny Chor, Amos Fiat and Moni Naor -- Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms / Ueli M. Maurer -- Fast generation of provable primes using search in arithmetic progressions / Preda Mihailescu -- Attack on the cryptographic scheme NIKS-TAS / Don Coppersmith -- On the risk of opening distributed keys / Mike Burmester.; Cryptanalysis of cryptosystems based on remote chaos replication / Th. Beth, D.E. Lazic and A. Mathias -- A Fourier transform approach to the linear complexity of nonlinearly filtered sequences / James L. Massey and Shirlei Sercouek -- The security of cipher block chaining / Mihir Bellare, Joe Kilian and Phillip Rogaway -- A chosen plaintext attack of the 16-round Khufu cryptosystem / Henri Gilbert and Pascal Chauvaud -- Ciphertext only attack for one-way function of the MAP using one ciphertext / Yukiyasu Tsunoo, Eiji Okamoto and Tomohiko Uyematsu -- Pitfalls in designing substitution boxes / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng -- A randomness-rounds tradeoff in private computation / Eyal Kushilevitz and Adi Rosen -- Secure voting using partially compatible homomorphisms / Kazue Sako and Joe Kilian -- Maintaining security in the presence of transient faults / Ran Canetti and Amir Herzberg. || Computers; Technology.
Advances in cryptology, CRYPTO '94 : 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 : proceedings (1994)
ISBN: 9783540583332 bzw. 3540583335, in Deutsch, Springer-Verlag, Berlin, Taschenbuch, gebraucht, Erstausgabe.
Grey-silver octavo; xii, 438 p, b&w illus ; 24 cm. Extremely little wear to spine head & foot, bottom corners slightly creased, light edgewear, faint sticker residue to front cover, else very good. Contents: The first experimental cryptanalysis of the Data Encryption Standard / Mitsuru Matsui -- Linear cryptanalysis of the Fast Data Encipherment Algorithm / Kazuo Ohta and Kazumaro Aoki -- Differential-linear cryptanalysis / Susan K. Langford and Martin E. Hellman -- Linear cryptanalysis using multiple approximations / Burton S. Kaliski, Jr. and M.J.B. Robshaw -- Hashing with SL[subscript 2] / Jean-Pierre Tillich and Gilles Zemor -- Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks / Jinhui Chao, Kazuo Tanada and Shigeo Tsujii -- Cryptographic protocols based on discrete logarithms in real-quadratic orders / Ingrid Biehl, Johannes Buchmann and Christoph Thiel -- Designated confirmer signatures and public-key encryption are equivalent / Tatsuaki Okamoto -- Directed acyclic graphs, one-way functions and digital signatures / Daniel Bleichenbacher and Ueli M. Maurer.; An identity-based signature scheme with bounded life-span / Olivier Delos and Jean-Jacques Quisquater -- More flexible exponentiation with precomputation / Chae Hoon Lim and Pil Joong Lee -- A parallel permutation multiplier for a PGM crypto-chip / Tamas Horvath, Spyros S. Magliveras and Tran van Trung -- Cryptographic randomness from air turbulence in disk drives / Don Davis, Ross Ihaka and Philip Fenstermacher -- Cryptanalysis of the Gemmell and Naor multiround authentication protocol / Christian Gehrmann -- LFSR-based hashing and authentication / Hugo Krawczyk -- New bound on authentication code with arbitration / Kaoru Kurosawa -- Multi-secret sharing schemes / Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia and Ugo Vaccaro -- Designing identification schemes with keys of short size / Jacques Stern -- Proofs of partial knowledge and simplified design of witness hiding protocols / Ronald Cramer, Ivan Damgard and Berry Schoenmakers.; Language dependent secure bit commitment / Toshiya Itoh, Yuji Ohta and Hiroki Shizuya -- On the length of cryptographic hash-values used in identification schemes / Marc Girault and Jacques Stern -- Incremental cryptography: the case of hashing and signing / Mihir Bellare, Oded Goldreich and Shafi Goldwasser -- An efficient existentially unforgeable signature scheme and its applications / Cynthia Dwork and Moni Naor -- Bounds for resilient functions and orthogonal arrays / Jurgen Bierbrauer, K. Gopalakrishnan and D.R. Stinson -- Tracing traitors / Benny Chor, Amos Fiat and Moni Naor -- Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms / Ueli M. Maurer -- Fast generation of provable primes using search in arithmetic progressions / Preda Mihailescu -- Attack on the cryptographic scheme NIKS-TAS / Don Coppersmith -- On the risk of opening distributed keys / Mike Burmester.; Cryptanalysis of cryptosystems based on remote chaos replication / Th. Beth, D.E. Lazic and A. Mathias -- A Fourier transform approach to the linear complexity of nonlinearly filtered sequences / James L. Massey and Shirlei Sercouek -- The security of cipher block chaining / Mihir Bellare, Joe Kilian and Phillip Rogaway -- A chosen plaintext attack of the 16-round Khufu cryptosystem / Henri Gilbert and Pascal Chauvaud -- Ciphertext only attack for one-way function of the MAP using one ciphertext / Yukiyasu Tsunoo, Eiji Okamoto and Tomohiko Uyematsu -- Pitfalls in designing substitution boxes / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng -- A randomness-rounds tradeoff in private computation / Eyal Kushilevitz and Adi Rosen -- Secure voting using partially compatible homomorphisms / Kazue Sako and Joe Kilian -- Maintaining security in the presence of transient faults / Ran Canetti and Amir Herzberg. || Computers; Technology. First editio.
Advances in Cryptology - Crypto '94: 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21 - 25, 1994. Proceeding (Lecture Notes in Computer Science.) (1994)
ISBN: 9780387583334 bzw. 0387583335, in Englisch, Springer, gebundenes Buch.
Von Händler/Antiquariat, Ergodebooks.
Springer, 1994-09-01. Hardcover. Used:Good. Buy with confidence. Excellent Customer Service & Return policy. Ships Fast. Expedite Shipping Available.
Advances in Cryptology - Crypto '94: 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21 - 25, 1994. Proceeding (Lecture Notes in Computer Science.) (1994)
ISBN: 9780387583334 bzw. 0387583335, in Englisch, Springer, gebundenes Buch, neu, Nachdruck.
This item is printed on demand.
Advances in Cryptology - CRYPTO '94 (1994)
ISBN: 3540583335 bzw. 9783540583332, vermutlich in Englisch, Springer Berlin Heidelberg, Taschenbuch, neu.