Information Security and Cryptology - ICISC 2001 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings /
Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6-7, 2001. The 63 Building, consisting of 60 stories above the ground...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2002.
|
Έκδοση: | 1st ed. 2002. |
Σειρά: | Lecture Notes in Computer Science,
2288 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Practical Security in Public-Key Cryptography
- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances
- Truncated Differential Cryptanalysis of Camellia
- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton
- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding
- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption
- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm
- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring
- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation
- Decentralized Event Correlation for Intrusion Detection
- Enhancing the Security of Cookies
- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation
- Efficient Revocation Schemes for Secure Multicast
- Binary Codes for Collusion-Secure Fingerprinting
- Copyright Protection of Object-Oriented Software
- Off-Line Authentication Using Watermarks
- Slide Attacks with a Known-Plaintext Cryptanalysis
- Constructions of Cheating Immune Secret Sharing
- Private Computation with Shared Randomness over Broadcast Channel
- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
- Practical Reasoning about Accountability in Electronic Commerce Protocols
- Content Extraction Signatures
- New Signcryption Schemes Based on KCDSA
- An Efficient and Provably Secure Threshold Blind Signature
- A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks
- A Distributed Light-Weight Authentication Model for Ad-hoc Networks
- Design of an Authentication Protocol for Gsm Javacards
- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment
- Protecting General Flexible Itineraries of Mobile Agents
- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks
- DPA Countermeasure Based on the "Masking Method".