Information security and cryptology--ICISC'99 : second international conference, Seoul, Korea, December 9-10, 1999 : proceedings / JooSeok Song (ed.)

This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Information Security and Cryptology, ICISC'99, held in Seoul, Korea, in December 1999. The 20 revised full papers presented together with an invited paper were carefully reviewed and selecte...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: ICISC (Conference) Seoul, Korea)
Other Authors: Song, JooSeok
Format: Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, 2000.
Series:Lecture notes in computer science ; 1787.
Subjects:
Table of Contents:
  • On provable security for conventional cryptography / Serge Vaudenay
  • Correlation properties of the bluetooth combiner generator / Miia Hermelin and Kaisa Nyberg
  • Preventing double-spent coins from revealing user's whole secret / DaeHun Nyang and JooSeok Song
  • On the optimal diffusion layers with practical security against differential and linear cryptanalysis / Ju-Sung Kang [and others]
  • Non-linear complexity of the Naor-Reingold pseudo-random function / William D. Banks [and others]
  • Relationships between bent functions and complementary plateaued functions / Yuliang Zheng and Xian-Mo Zhang
  • A technique for boosting the security of cryptographic systems with one-way hash functions / Takeshi Koshiba
  • Over F[subscript p] vs. over F₂[superscript n] and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems / Yasuyuki Sakai and Kouichi Sakurai
  • Speeding up elliptic scalar multiplication with precomputation / Chae Hoon Lim and Hyo Sun Hwang
  • Why hierarchical key distribution is appropriate for multicast networks / Chandana Gamage, Jussipekka Leiwo, and Yuliang Zheng
  • Secure selection protocols / Kapali Viswanathan, Colin Boyd, and Ed Dawson
  • Efficient 3-pass password-based key exchange protocol with low computational cost for client / Hyoungkyu Lee [and others]
  • A 2-pass authentication and key agreement protocol for mobile communications / Kook-Heui Lee [and others]
  • Verifiable secret sharing and time capsules / Josef Pieprzyk and Eiji Okamoto
  • A new approach to robust threshold RSA signature schemes / Rei Safavi-Naini, Huaxiong Wang, and Kwok-Yan Lam
  • On threshold RSA-signing with no dealer / Shingo Miyazaki, Kouichi Sakurai, and Moti Yung
  • A new approach to efficient verifiable secret sharing for threshold KCDSA signature / Ho-Sun Yoon and Heung-Youl Youm
  • A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems / Tetsuya Tamura, Kouichi Sakurai, and Tsutomu Matsumoto
  • A security design for a wide-area distributed system / Jussipekka Leiwo [and others]
  • Self-escrowed public-key infrastructures / Pascal Paillier and Moti Yung
  • Electronic funds transfer protocol using domain-verifiable signcryption scheme / Moonseog Seo and Kwangjo Kim.