Amazon cover image
Image from Amazon.com
Image from Google Jackets

Information Security and Cryptology - ICISC’99 [electronic resource] : Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings / edited by JooSeok Song.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 1787Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2000Description: XII, 284 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540455684
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Invited Talk -- On Provable Security for Conventional Cryptography -- Cryptanalysis and Cryptographic Design -- Correlation Properties of the Bluetooth Combiner -- Preventing Double-Spent Coins from Revealing User’s Whole Secret -- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis -- Non-linear Complexity of the Naor–Reingold Pseudo-random Function -- Cryptographic Theory and Computation Complexity -- Relationships between Bent Functions and Complementary Plateaued Functions -- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions -- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems -- Speeding Up Elliptic Scalar Multiplication with Precomputation -- Cryptographic Protocol and Authentication Design -- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks -- Secure Selection Protocols -- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client -- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications -- Digital Signature and Secret Sharing Scheme -- Verifiable Secret Sharing and Time Capsules -- A New Approach to Robust Threshold RSA Signature Schemes -- On Threshold RSA-Signing with no Dealer -- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature -- Electronic Cash, Application, Implementation -- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems -- A Security Design for a Wide-Area Distributed System -- Self-Escrowed Public-Key Infrastructures -- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK5449

Invited Talk -- On Provable Security for Conventional Cryptography -- Cryptanalysis and Cryptographic Design -- Correlation Properties of the Bluetooth Combiner -- Preventing Double-Spent Coins from Revealing User’s Whole Secret -- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis -- Non-linear Complexity of the Naor–Reingold Pseudo-random Function -- Cryptographic Theory and Computation Complexity -- Relationships between Bent Functions and Complementary Plateaued Functions -- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions -- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems -- Speeding Up Elliptic Scalar Multiplication with Precomputation -- Cryptographic Protocol and Authentication Design -- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks -- Secure Selection Protocols -- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client -- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications -- Digital Signature and Secret Sharing Scheme -- Verifiable Secret Sharing and Time Capsules -- A New Approach to Robust Threshold RSA Signature Schemes -- On Threshold RSA-Signing with no Dealer -- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature -- Electronic Cash, Application, Implementation -- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems -- A Security Design for a Wide-Area Distributed System -- Self-Escrowed Public-Key Infrastructures -- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India