Information Security and Cryptology - ICISC’99 [electronic resource] : Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings /

Invited Talk -- On Provable Security for Conventional Cryptography -- Cryptanalysis and Cryptographic Design -- Correlation Properties of the Bluetooth Combiner -- Preventing Double-Spent Coins from Revealing User’s Whole Secret -- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis -- Non-linear Complexity of the Naor–Reingold Pseudo-random Function -- Cryptographic Theory and Computation Complexity -- Relationships between Bent Functions and Complementary Plateaued Functions -- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions -- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems -- Speeding Up Elliptic Scalar Multiplication with Precomputation -- Cryptographic Protocol and Authentication Design -- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks -- Secure Selection Protocols -- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client -- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications -- Digital Signature and Secret Sharing Scheme -- Verifiable Secret Sharing and Time Capsules -- A New Approach to Robust Threshold RSA Signature Schemes -- On Threshold RSA-Signing with no Dealer -- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature -- Electronic Cash, Application, Implementation -- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems -- A Security Design for a Wide-Area Distributed System -- Self-Escrowed Public-Key Infrastructures -- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.

Saved in:
Bibliographic Details
Main Authors: Song, JooSeok. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2000
Subjects:Computer science., Computer communication systems., Data encryption (Computer science)., Algorithms., Computer science, Management information systems., Computer Science., Data Encryption., Computer Communication Networks., Algorithm Analysis and Problem Complexity., Management of Computing and Information Systems., Discrete Mathematics in Computer Science.,
Online Access:http://dx.doi.org/10.1007/10719994
Tags: Add Tag
No Tags, Be the first to tag this record!