|
" Information security and cryptology--ICISC'99 "
JooSeok Song (ed.).
Document Type
|
:
|
BL
|
Record Number
|
:
|
604563
|
Doc. No
|
:
|
b433782
|
Main Entry
|
:
|
ICISC (Conference)(2nd :1999 :, Seoul, Korea)
|
Title & Author
|
:
|
Information security and cryptology--ICISC'99 : second international conference, Seoul, Korea, December 9-10, 1999 : proceedings /\ JooSeok Song (ed.).
|
Publication Statement
|
:
|
Berlin ;New York :: Springer,, 2000.
|
Series Statement
|
:
|
Lecture notes in computer science ;; 1787
|
Page. NO
|
:
|
xi, 277 p. :: ill. ;; 24 cm.
|
ISBN
|
:
|
3540673806 (softcover : alk. paper)
|
|
:
|
: 9783540673804 (softcover : alk. paper)
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index.
|
Contents
|
:
|
On provable security for conventional cryptography / Serge Vaudenay -- Correlation properties of the bluetooth combiner generator / Miia Hermelin and Kaisa Nyberg -- Preventing double-spent coins from revealing user's whole secret / DaeHun Nyang and JooSeok Song -- On the optimal diffusion layers with practical security against differential and linear cryptanalysis / Ju-Sung Kang ... [et al.] -- Non-linear complexity of the Naor-Reingold pseudo-random function / William D. Banks ... [et al.] -- Relationships between bent functions and complementary plateaued functions / Yuliang Zheng and Xian-Mo Zhang -- A technique for boosting the security of cryptographic systems with one-way hash functions / Takeshi Koshiba -- Over F[subscript p] vs. over F₂[superscript n] and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems / Yasuyuki Sakai and Kouichi Sakurai -- Speeding up elliptic scalar multiplication with precomputation / Chae Hoon Lim and Hyo Sun Hwang -- Why hierarchical key distribution is appropriate for multicast networks / Chandana Gamage, Jussipekka Leiwo, and Yuliang Zheng -- Secure selection protocols / Kapali Viswanathan, Colin Boyd, and Ed Dawson -- Efficient 3-pass password-based key exchange protocol with low computational cost for client / Hyoungkyu Lee ... [et al.] -- A 2-pass authentication and key agreement protocol for mobile communications / Kook-Heui Lee ... [et al.] -- Verifiable secret sharing and time capsules / Josef Pieprzyk and Eiji Okamoto -- A new approach to robust threshold RSA signature schemes / Rei Safavi-Naini, Huaxiong Wang, and Kwok-Yan Lam -- On threshold RSA-signing with no dealer / Shingo Miyazaki, Kouichi Sakurai, and Moti Yung -- A new approach to efficient verifiable secret sharing for threshold KCDSA signature / Ho-Sun Yoon and Heung-Youl Youm -- A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems / Tetsuya Tamura, Kouichi Sakurai, and Tsutomu Matsumoto -- A security design for a wide-area distributed system / Jussipekka Leiwo ... [et al.] -- Self-escrowed public-key infrastructures / Pascal Paillier and Moti Yung -- Electronic funds transfer protocol using domain-verifiable signcryption scheme / Moonseog Seo and Kwangjo Kim.
|
Subject
|
:
|
Computer security, Congresses.
|
Subject
|
:
|
Cryptography, Congresses.
|
Added Entry
|
:
|
Song, JooSeok.
|
| |