License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemRep.355
URN: urn:nbn:de:0030-drops-152357
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2021/15235/
 


Maurer, Ueli ; Shamir, Adi ; Stern, Jacques ; Yung, Moti
Weitere Beteiligte (Hrsg. etc.): Ueli Maurer and Adi Shamir and Jacques Stern and Moti Yung

Cryptography (Dagstuhl Seminar 02391)

pdf-format:
DagSemRep-355.pdf (0.9 MB)


BibTeX - Entry

@TechReport{maurer_et_al:DagSemRep.355,
  author =	{Maurer, Ueli and Shamir, Adi and Stern, Jacques and Yung, Moti},
  title =	{{Cryptography (Dagstuhl Seminar 02391)}},
  pages =	{1--21},
  ISSN =	{1619-0203},
  year =	{2003},
  type = 	{Dagstuhl Seminar Report},
  number =	{355},
  institution =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/opus/volltexte/2021/15235},
  URN =		{urn:nbn:de:0030-drops-152357},
  doi =		{10.4230/DagSemRep.355},
}

Collection: Dagstuhl Seminar Reports
Issue Date: 2021
Date of publication: 26.03.2003


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI