Information Security and Cryptology - ICISC'99
Springer Berlin (Verlag)
9783540673804 (ISBN)
Invited Talk.- On Provable Security for Conventional Cryptography.- Cryptanalysis and Cryptographic Design.- Correlation Properties of the Bluetooth Combiner.- Preventing Double-Spent Coins from Revealing User's Whole Secret.- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.- Non-linear Complexity of the Naor-Reingold Pseudo-random Function.- Cryptographic Theory and Computation Complexity.- Relationships between Bent Functions and Complementary Plateaued Functions.- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions.- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems.- Speeding Up Elliptic Scalar Multiplication with Precomputation.- Cryptographic Protocol and Authentication Design.- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.- Secure Selection Protocols.- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client.- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications.- Digital Signature and Secret Sharing Scheme.- Verifiable Secret Sharing and Time Capsules.- A New Approach to Robust Threshold RSA Signature Schemes.- On Threshold RSA-Signing with no Dealer.- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature.- Electronic Cash, Application, Implementation.- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.- A Security Design for a Wide-Area Distributed System.- Self-Escrowed Public-Key Infrastructures.- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.
| Erscheint lt. Verlag | 12.4.2000 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | XII, 284 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 233 mm |
| Gewicht | 426 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Algorithm analysis and problem complexity • Complexity • cryptographic algorithms • Cryptology • data encryption • Data Security • Information Security • Network Security • secure communication |
| ISBN-13 | 9783540673804 / 9783540673804 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich