رکورد قبلیرکورد بعدی

" Information security and cryptology--ICISC'99 "


Document Type : BL
Record Number : 604563
Doc. No : b433782
Main Entry : ICISC (Conference)(2nd :1999 :, Seoul, Korea)
Title & Author : Information security and cryptology--ICISC'99 : second international conference, Seoul, Korea, December 9-10, 1999 : proceedings /\ JooSeok Song (ed.).
Publication Statement : Berlin ;New York :: Springer,, 2000.
Series Statement : Lecture notes in computer science ;; 1787
Page. NO : xi, 277 p. :: ill. ;; 24 cm.
ISBN : 3540673806 (softcover : alk. paper)
: : 9783540673804 (softcover : alk. paper)
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : On provable security for conventional cryptography / Serge Vaudenay -- Correlation properties of the bluetooth combiner generator / Miia Hermelin and Kaisa Nyberg -- Preventing double-spent coins from revealing user's whole secret / DaeHun Nyang and JooSeok Song -- On the optimal diffusion layers with practical security against differential and linear cryptanalysis / Ju-Sung Kang ... [et al.] -- Non-linear complexity of the Naor-Reingold pseudo-random function / William D. Banks ... [et al.] -- Relationships between bent functions and complementary plateaued functions / Yuliang Zheng and Xian-Mo Zhang -- A technique for boosting the security of cryptographic systems with one-way hash functions / Takeshi Koshiba -- Over F[subscript p] vs. over F₂[superscript n] and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems / Yasuyuki Sakai and Kouichi Sakurai -- Speeding up elliptic scalar multiplication with precomputation / Chae Hoon Lim and Hyo Sun Hwang -- Why hierarchical key distribution is appropriate for multicast networks / Chandana Gamage, Jussipekka Leiwo, and Yuliang Zheng -- Secure selection protocols / Kapali Viswanathan, Colin Boyd, and Ed Dawson -- Efficient 3-pass password-based key exchange protocol with low computational cost for client / Hyoungkyu Lee ... [et al.] -- A 2-pass authentication and key agreement protocol for mobile communications / Kook-Heui Lee ... [et al.] -- Verifiable secret sharing and time capsules / Josef Pieprzyk and Eiji Okamoto -- A new approach to robust threshold RSA signature schemes / Rei Safavi-Naini, Huaxiong Wang, and Kwok-Yan Lam -- On threshold RSA-signing with no dealer / Shingo Miyazaki, Kouichi Sakurai, and Moti Yung -- A new approach to efficient verifiable secret sharing for threshold KCDSA signature / Ho-Sun Yoon and Heung-Youl Youm -- A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems / Tetsuya Tamura, Kouichi Sakurai, and Tsutomu Matsumoto -- A security design for a wide-area distributed system / Jussipekka Leiwo ... [et al.] -- Self-escrowed public-key infrastructures / Pascal Paillier and Moti Yung -- Electronic funds transfer protocol using domain-verifiable signcryption scheme / Moonseog Seo and Kwangjo Kim.
Subject : Computer security, Congresses.
Subject : Cryptography, Congresses.
Added Entry : Song, JooSeok.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟