Information Security and Cryptology - ICISC 2001 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings /

Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6-7, 2001. The 63 Building, consisting of 60 stories above the ground...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Kim, Kwangjo (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2288
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Practical Security in Public-Key Cryptography
  • A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances
  • Truncated Differential Cryptanalysis of Camellia
  • Improved Impossible Differential Cryptanalysis of Rijndael and Crypton
  • Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding
  • An IND-CCA2 Public-Key Cryptosystem with Fast Decryption
  • Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm
  • Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring
  • Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation
  • Decentralized Event Correlation for Intrusion Detection
  • Enhancing the Security of Cookies
  • A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation
  • Efficient Revocation Schemes for Secure Multicast
  • Binary Codes for Collusion-Secure Fingerprinting
  • Copyright Protection of Object-Oriented Software
  • Off-Line Authentication Using Watermarks
  • Slide Attacks with a Known-Plaintext Cryptanalysis
  • Constructions of Cheating Immune Secret Sharing
  • Private Computation with Shared Randomness over Broadcast Channel
  • An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
  • Practical Reasoning about Accountability in Electronic Commerce Protocols
  • Content Extraction Signatures
  • New Signcryption Schemes Based on KCDSA
  • An Efficient and Provably Secure Threshold Blind Signature
  • A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks
  • A Distributed Light-Weight Authentication Model for Ad-hoc Networks
  • Design of an Authentication Protocol for Gsm Javacards
  • Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment
  • Protecting General Flexible Itineraries of Mobile Agents
  • RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
  • A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
  • A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks
  • DPA Countermeasure Based on the "Masking Method".