Fr. 69.00

Information Security and Cryptology - ICISC'99 - Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who wasreviewing which paper. The 23 TPC members ?nallyselected 20 top-quality papers for presentation at ICISC 1999 together with one invited talk. Serge Vaudenay gave an invited talk on Provable Security for Conventional Crypt- raphy . Many people contributed to ICISC 99. First of all I would like to thank all the authorswho submitted papers. I amgrateful to the TPC members fortheirhard workreviewing the papers andthe OrganizationCommittee members for all the supporting activities which made ICISC 99 a success. I would like to thank the Ministry of Information and Communication of Korea (MIC) which ?nancially sponsored ICISC 99. Special thanks go to Pil Joong Lee and Heung Youl Youm who helped me during the wholeprocess of preparation for the conference. Last, but notleast, I thank my students, KyuMan Ko, SungkyuChie, andChan Yoon Jung.

List of contents

Invited Talk.- On Provable Security for Conventional Cryptography.- Cryptanalysis and Cryptographic Design.- Correlation Properties of the Bluetooth Combiner.- Preventing Double-Spent Coins from Revealing User's Whole Secret.- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.- Non-linear Complexity of the Naor-Reingold Pseudo-random Function.- Cryptographic Theory and Computation Complexity.- Relationships between Bent Functions and Complementary Plateaued Functions.- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions.- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems.- Speeding Up Elliptic Scalar Multiplication with Precomputation.- Cryptographic Protocol and Authentication Design.- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.- Secure Selection Protocols.- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client.- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications.- Digital Signature and Secret Sharing Scheme.- Verifiable Secret Sharing and Time Capsules.- A New Approach to Robust Threshold RSA Signature Schemes.- On Threshold RSA-Signing with no Dealer.- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature.- Electronic Cash, Application, Implementation.- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.- A Security Design for a Wide-Area Distributed System.- Self-Escrowed Public-Key Infrastructures.- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.

Product details

Assisted by Jooseo Song (Editor), Jooseok Song (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.07.2009
 
EAN 9783540673804
ISBN 978-3-540-67380-4
No. of pages 284
Weight 426 g
Illustrations XII, 284 p.
Series Lecture Notes in Computer Science
Lecture Notes in Computer Science
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.