Information Security and Cryptology - ICISC'99 Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Song, JooSeok (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
Έκδοση:1st ed. 2000.
Σειρά:Lecture Notes in Computer Science, 1787
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talk
  • On Provable Security for Conventional Cryptography
  • Cryptanalysis and Cryptographic Design
  • Correlation Properties of the Bluetooth Combiner
  • Preventing Double-Spent Coins from Revealing User's Whole Secret
  • On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis
  • Non-linear Complexity of the Naor-Reingold Pseudo-random Function
  • Cryptographic Theory and Computation Complexity
  • Relationships between Bent Functions and Complementary Plateaued Functions
  • A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions
  • Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems
  • Speeding Up Elliptic Scalar Multiplication with Precomputation
  • Cryptographic Protocol and Authentication Design
  • Why Hierarchical Key Distribution Is Appropriate for Multicast Networks
  • Secure Selection Protocols
  • Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client
  • A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications
  • Digital Signature and Secret Sharing Scheme
  • Verifiable Secret Sharing and Time Capsules
  • A New Approach to Robust Threshold RSA Signature Schemes
  • On Threshold RSA-Signing with no Dealer
  • A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature
  • Electronic Cash, Application, Implementation
  • A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems
  • A Security Design for a Wide-Area Distributed System
  • Self-Escrowed Public-Key Infrastructures
  • Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.