Information Security and Cryptology - ICISC’99 [electronic resource] : Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings / edited by JooSeok Song.
Material type: TextSeries: Lecture Notes in Computer Science ; 1787Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2000Description: XII, 284 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540455684Subject(s): Computer science | Computer Communication Networks | Data encryption (Computer science) | Computer software | Computational complexity | Information Systems | Computer Science | Data Encryption | Computer Communication Networks | Algorithm Analysis and Problem Complexity | Management of Computing and Information Systems | Discrete Mathematics in Computer ScienceAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access onlineCurrent library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK5449 |
Invited Talk -- On Provable Security for Conventional Cryptography -- Cryptanalysis and Cryptographic Design -- Correlation Properties of the Bluetooth Combiner -- Preventing Double-Spent Coins from Revealing User’s Whole Secret -- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis -- Non-linear Complexity of the Naor–Reingold Pseudo-random Function -- Cryptographic Theory and Computation Complexity -- Relationships between Bent Functions and Complementary Plateaued Functions -- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions -- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems -- Speeding Up Elliptic Scalar Multiplication with Precomputation -- Cryptographic Protocol and Authentication Design -- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks -- Secure Selection Protocols -- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client -- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications -- Digital Signature and Secret Sharing Scheme -- Verifiable Secret Sharing and Time Capsules -- A New Approach to Robust Threshold RSA Signature Schemes -- On Threshold RSA-Signing with no Dealer -- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature -- Electronic Cash, Application, Implementation -- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems -- A Security Design for a Wide-Area Distributed System -- Self-Escrowed Public-Key Infrastructures -- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.
There are no comments on this title.