Information Security and Cryptology - ICISC'99 Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings /

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Song, JooSeok (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
Edition:1st ed. 2000.
Series:Lecture Notes in Computer Science, 1787
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Invited Talk
  • On Provable Security for Conventional Cryptography
  • Cryptanalysis and Cryptographic Design
  • Correlation Properties of the Bluetooth Combiner
  • Preventing Double-Spent Coins from Revealing User's Whole Secret
  • On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis
  • Non-linear Complexity of the Naor-Reingold Pseudo-random Function
  • Cryptographic Theory and Computation Complexity
  • Relationships between Bent Functions and Complementary Plateaued Functions
  • A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions
  • Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems
  • Speeding Up Elliptic Scalar Multiplication with Precomputation
  • Cryptographic Protocol and Authentication Design
  • Why Hierarchical Key Distribution Is Appropriate for Multicast Networks
  • Secure Selection Protocols
  • Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client
  • A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications
  • Digital Signature and Secret Sharing Scheme
  • Verifiable Secret Sharing and Time Capsules
  • A New Approach to Robust Threshold RSA Signature Schemes
  • On Threshold RSA-Signing with no Dealer
  • A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature
  • Electronic Cash, Application, Implementation
  • A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems
  • A Security Design for a Wide-Area Distributed System
  • Self-Escrowed Public-Key Infrastructures
  • Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.