Information Security and Cryptology - ICISC'99 Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2000.
|
Έκδοση: | 1st ed. 2000. |
Σειρά: | Lecture Notes in Computer Science,
1787 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talk
- On Provable Security for Conventional Cryptography
- Cryptanalysis and Cryptographic Design
- Correlation Properties of the Bluetooth Combiner
- Preventing Double-Spent Coins from Revealing User's Whole Secret
- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis
- Non-linear Complexity of the Naor-Reingold Pseudo-random Function
- Cryptographic Theory and Computation Complexity
- Relationships between Bent Functions and Complementary Plateaued Functions
- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions
- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems
- Speeding Up Elliptic Scalar Multiplication with Precomputation
- Cryptographic Protocol and Authentication Design
- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks
- Secure Selection Protocols
- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client
- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications
- Digital Signature and Secret Sharing Scheme
- Verifiable Secret Sharing and Time Capsules
- A New Approach to Robust Threshold RSA Signature Schemes
- On Threshold RSA-Signing with no Dealer
- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature
- Electronic Cash, Application, Implementation
- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems
- A Security Design for a Wide-Area Distributed System
- Self-Escrowed Public-Key Infrastructures
- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.