Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings by JooSeok SongInformation Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings by JooSeok Song

Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea…

EditorJooSeok Song

Paperback | April 12, 2000

Pricing and Purchase Info

$120.00 online 
$128.95 list price save 6%
Earn 600 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Information Security and Cryptology, ICISC'99, held in Seoul, Korea, in December 1999.The 20 revised full papers presented together with an invited paper were carefully reviewed and selected from a total of 61 submissions. The book is divided into topical sections on cryptoanalysis and cryptographic design; cryptographic theory and computation complexity; cryptographic protocols and authentication design; digital signatures and secret sharing; and electronic cash, applications, and implementation.
Title:Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea…Format:PaperbackDimensions:296 pagesPublished:April 12, 2000Publisher:Springer Berlin HeidelbergLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540673806

ISBN - 13:9783540673804

Reviews

Table of Contents

Invited Talk.- On Provable Security for Conventional Cryptography.- Cryptanalysis and Cryptographic Design.- Correlation Properties of the Bluetooth Combiner.- Preventing Double-Spent Coins from Revealing User's Whole Secret.- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.- Non-linear Complexity of the Naor-Reingold Pseudo-random Function.- Cryptographic Theory and Computation Complexity.- Relationships between Bent Functions and Complementary Plateaued Functions.- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions.- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems.- Speeding Up Elliptic Scalar Multiplication with Precomputation.- Cryptographic Protocol and Authentication Design.- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.- Secure Selection Protocols.- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client.- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications.- Digital Signature and Secret Sharing Scheme.- Verifiable Secret Sharing and Time Capsules.- A New Approach to Robust Threshold RSA Signature Schemes.- On Threshold RSA-Signing with no Dealer.- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature.- Electronic Cash, Application, Implementation.- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.- A Security Design for a Wide-Area Distributed System.- Self-Escrowed Public-Key Infrastructures.- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.