Information Security and Cryptology - ICISC'99 Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings /

Information Security and Cryptology - ICISC'99 Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings / [electronic resource] : edited by JooSeok Song. - 1st ed. 2000. - XII, 284 p. online resource. - Lecture Notes in Computer Science, 1787 1611-3349 ; . - Lecture Notes in Computer Science, 1787 .

Invited Talk -- On Provable Security for Conventional Cryptography -- Cryptanalysis and Cryptographic Design -- Correlation Properties of the Bluetooth Combiner -- Preventing Double-Spent Coins from Revealing User’s Whole Secret -- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis -- Non-linear Complexity of the Naor–Reingold Pseudo-random Function -- Cryptographic Theory and Computation Complexity -- Relationships between Bent Functions and Complementary Plateaued Functions -- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions -- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems -- Speeding Up Elliptic Scalar Multiplication with Precomputation -- Cryptographic Protocol and Authentication Design -- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks -- Secure Selection Protocols -- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client -- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications -- Digital Signature and Secret Sharing Scheme -- Verifiable Secret Sharing and Time Capsules -- A New Approach to Robust Threshold RSA Signature Schemes -- On Threshold RSA-Signing with no Dealer -- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature -- Electronic Cash, Application, Implementation -- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems -- A Security Design for a Wide-Area Distributed System -- Self-Escrowed Public-Key Infrastructures -- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.

9783540455684

10.1007/10719994 doi


Cryptography.
Data encryption (Computer science).
Computer networks .
Algorithms.
Electronic data processing--Management.
Computer science--Mathematics.
Discrete mathematics.
Cryptology.
Computer Communication Networks.
Algorithms.
IT Operations.
Discrete Mathematics in Computer Science.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in