Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)

Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
分享
扫描下方二维码分享到微信
打开微信,点击右上角”+“,
使用”扫一扫“即可将网页分享到朋友圈。
作者:
2000-12
版次: 1
ISBN: 9783540417828
装帧: 平装
开本: 其他
纸张: 胶版纸
页数: 260页
  • Book Description

      This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Information Security and Cryptology, ICISC 2000, held in Seoul, Korea, in December 2000.

      The 20 revised full papers presented were carefully reviewed and selected from a total of 56 submissions. Among the topics addressed are cryptanalysis, elliptic curve cryptography, cryptographic protocols, block ciphers, hash functions, multi-party protocols, digital signatures, E-commerce, anonymous auction systems, finite field polynomials, anonymous fingerprinting, network security, and security evaluation systems. A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures

    On the Strength of KASUMI without FL Functions against Higher Order Differential Attack

    On MISTY1 Higher Order Differential Cryptanalysis

    Difference Distribution Attack on DONUT and Improved DONUT  

    New Results on Correlation Immunity

    Elliptic Curves and Resilient Functions

    Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction

    Characterization of Elliptic Curve Traces under FR-Reduction

    A Multi-party Optimistic Non-repudiation Protocol

    Secure Matchmaking Protocol

    An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA

    Efficient and Secure Member Deletion in Group Signature Schemes

    An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods

    An Internet Anonymous Auction Scheme

    Efficient Sealed-Bid Auction Using Hash Chain

    Micropayments for Wireless Communications

    Cryptographic Applications of Sparse Polynomials over Finite Rings

    Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors

    Hash to the Rescue: Space Minimization for PKI Directories

    A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management

    Author Index
  • 内容简介:
    Book Description

      This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Information Security and Cryptology, ICISC 2000, held in Seoul, Korea, in December 2000.

      The 20 revised full papers presented were carefully reviewed and selected from a total of 56 submissions. Among the topics addressed are cryptanalysis, elliptic curve cryptography, cryptographic protocols, block ciphers, hash functions, multi-party protocols, digital signatures, E-commerce, anonymous auction systems, finite field polynomials, anonymous fingerprinting, network security, and security evaluation systems.
  • 目录:
    A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures

    On the Strength of KASUMI without FL Functions against Higher Order Differential Attack

    On MISTY1 Higher Order Differential Cryptanalysis

    Difference Distribution Attack on DONUT and Improved DONUT  

    New Results on Correlation Immunity

    Elliptic Curves and Resilient Functions

    Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction

    Characterization of Elliptic Curve Traces under FR-Reduction

    A Multi-party Optimistic Non-repudiation Protocol

    Secure Matchmaking Protocol

    An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA

    Efficient and Secure Member Deletion in Group Signature Schemes

    An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods

    An Internet Anonymous Auction Scheme

    Efficient Sealed-Bid Auction Using Hash Chain

    Micropayments for Wireless Communications

    Cryptographic Applications of Sparse Polynomials over Finite Rings

    Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors

    Hash to the Rescue: Space Minimization for PKI Directories

    A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management

    Author Index
查看详情
相关图书 / 更多
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
Industrial Clusters, Institutions and Poverty in Nigeria: The Otigba Information and Communications Technology Cluster
Oyeyinka;Oyebanke
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
Intuitive Health Workbook
安徽省交通建设工程质量监督局
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
Incest
Angot;Christine;Lewis;Tess
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
Interpretation of Nietzsche\'s Second Untimely Meditation
Heidegger;Martin;Haase;Ullrich
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
Investigations on the Theory of the Brownian Movement
Albert Einstein
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
InAs/AlSb异质结型射频场效应晶体管技术
关赫
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
Introduction to Probability
Freund;John E
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
Introduction to Seismology
Peter M. Shearer
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
In the Heart of the Sea (Young Readers Edition) The True Story of the Whaleship Essex
Philbrick;Nathaniel
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
Introduction to the Finite-Difference Time-Domain (Fdtd) Method for Electromagnetics
Gedney;Stephen D
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
Introduction to the Theory of Relativity
Bergmann;Peter G
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
Introduction to AC Machine Design
Lipo;Thomas A