Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008406470/catalog> ?p ?o. }
Showing items 1 to 35 of
35
with 100 items per page.
- catalog abstract "The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who wasreviewing which paper. The 23 TPC members ?nallyselected 20 top-quality papers for presentation at ICISC 1999 together with one invited talk. Serge Vaudenay gave an invited talk on “Provable Security for Conventional Crypt- raphy”. Many people contributed to ICISC’99. First of all I would like to thank all the authorswho submitted papers. I amgrateful to the TPC members fortheirhard workreviewing the papers andthe OrganizationCommittee members for all the supporting activities which made ICISC’99 a success. I would like to thank the Ministry of Information and Communication of Korea (MIC) which ?nancially sponsored ICISC’99. Special thanks go to Pil Joong Lee and Heung Youl Youm who helped me during the wholeprocess of preparation for the conference. Last, but notleast, I thank my students, KyuMan Ko, SungkyuChie, andChan Yoon Jung.".
- catalog contributor b11710163.
- catalog contributor b11710164.
- catalog created "2000.".
- catalog date "2000".
- catalog date "2000.".
- catalog dateCopyrighted "2000.".
- catalog description "A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems / Tetsuya Tamura, Kouichi Sakurai, and Tsutomu Matsumoto -- A security design for a wide-area distributed system / Jussipekka Leiwo [and others] -- Self-escrowed public-key infrastructures / Pascal Paillier and Moti Yung -- Electronic funds transfer protocol using domain-verifiable signcryption scheme / Moonseog Seo and Kwangjo Kim.".
- catalog description "Includes bibliographical references and index.".
- catalog description "On provable security for conventional cryptography / Serge Vaudenay -- Correlation properties of the bluetooth combiner generator / Miia Hermelin and Kaisa Nyberg -- Preventing double-spent coins from revealing user's whole secret / DaeHun Nyang and JooSeok Song -- On the optimal diffusion layers with practical security against differential and linear cryptanalysis / Ju-Sung Kang [and others] -- Non-linear complexity of the Naor-Reingold pseudo-random function / William D. Banks [and others] -- Relationships between bent functions and complementary plateaued functions / Yuliang Zheng and Xian-Mo Zhang -- A technique for boosting the security of cryptographic systems with one-way hash functions / Takeshi Koshiba -- Over F[subscript p] vs. over F₂[superscript n] and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems / Yasuyuki Sakai and Kouichi Sakurai -- ".
- catalog description "Speeding up elliptic scalar multiplication with precomputation / Chae Hoon Lim and Hyo Sun Hwang -- Why hierarchical key distribution is appropriate for multicast networks / Chandana Gamage, Jussipekka Leiwo, and Yuliang Zheng -- Secure selection protocols / Kapali Viswanathan, Colin Boyd, and Ed Dawson -- Efficient 3-pass password-based key exchange protocol with low computational cost for client / Hyoungkyu Lee [and others] -- A 2-pass authentication and key agreement protocol for mobile communications / Kook-Heui Lee [and others] -- Verifiable secret sharing and time capsules / Josef Pieprzyk and Eiji Okamoto -- A new approach to robust threshold RSA signature schemes / Rei Safavi-Naini, Huaxiong Wang, and Kwok-Yan Lam -- On threshold RSA-signing with no dealer / Shingo Miyazaki, Kouichi Sakurai, and Moti Yung -- A new approach to efficient verifiable secret sharing for threshold KCDSA signature / Ho-Sun Yoon and Heung-Youl Youm -- ".
- catalog description "The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who wasreviewing which paper. The 23 TPC members ?nallyselected 20 top-quality papers for presentation at ICISC 1999 together with one invited talk. Serge Vaudenay gave an invited talk on “Provable Security for Conventional Crypt- raphy”. Many people contributed to ICISC’99. First of all I would like to thank all the authorswho submitted papers. I amgrateful to the TPC members fortheirhard workreviewing the papers andthe OrganizationCommittee members for all the supporting activities which made ICISC’99 a success. I would like to thank the Ministry of Information and Communication of Korea (MIC) which ?nancially sponsored ICISC’99. Special thanks go to Pil Joong Lee and Heung Youl Youm who helped me during the wholeprocess of preparation for the conference. Last, but notleast, I thank my students, KyuMan Ko, SungkyuChie, andChan Yoon Jung.".
- catalog extent "xi, 277 p. :".
- catalog identifier "3540673806 (softcover : alk. paper)".
- catalog isPartOf "Lecture notes in computer science ; 1787".
- catalog issued "2000".
- catalog issued "2000.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.8 21".
- catalog subject "Computational complexity.".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer science.".
- catalog subject "Computer security Congresses.".
- catalog subject "Computer software.".
- catalog subject "Cryptography Congresses.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "Information Systems.".
- catalog subject "QA76.9.A25 I32 1999".
- catalog tableOfContents "A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems / Tetsuya Tamura, Kouichi Sakurai, and Tsutomu Matsumoto -- A security design for a wide-area distributed system / Jussipekka Leiwo [and others] -- Self-escrowed public-key infrastructures / Pascal Paillier and Moti Yung -- Electronic funds transfer protocol using domain-verifiable signcryption scheme / Moonseog Seo and Kwangjo Kim.".
- catalog tableOfContents "On provable security for conventional cryptography / Serge Vaudenay -- Correlation properties of the bluetooth combiner generator / Miia Hermelin and Kaisa Nyberg -- Preventing double-spent coins from revealing user's whole secret / DaeHun Nyang and JooSeok Song -- On the optimal diffusion layers with practical security against differential and linear cryptanalysis / Ju-Sung Kang [and others] -- Non-linear complexity of the Naor-Reingold pseudo-random function / William D. Banks [and others] -- Relationships between bent functions and complementary plateaued functions / Yuliang Zheng and Xian-Mo Zhang -- A technique for boosting the security of cryptographic systems with one-way hash functions / Takeshi Koshiba -- Over F[subscript p] vs. over F₂[superscript n] and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems / Yasuyuki Sakai and Kouichi Sakurai -- ".
- catalog tableOfContents "Speeding up elliptic scalar multiplication with precomputation / Chae Hoon Lim and Hyo Sun Hwang -- Why hierarchical key distribution is appropriate for multicast networks / Chandana Gamage, Jussipekka Leiwo, and Yuliang Zheng -- Secure selection protocols / Kapali Viswanathan, Colin Boyd, and Ed Dawson -- Efficient 3-pass password-based key exchange protocol with low computational cost for client / Hyoungkyu Lee [and others] -- A 2-pass authentication and key agreement protocol for mobile communications / Kook-Heui Lee [and others] -- Verifiable secret sharing and time capsules / Josef Pieprzyk and Eiji Okamoto -- A new approach to robust threshold RSA signature schemes / Rei Safavi-Naini, Huaxiong Wang, and Kwok-Yan Lam -- On threshold RSA-signing with no dealer / Shingo Miyazaki, Kouichi Sakurai, and Moti Yung -- A new approach to efficient verifiable secret sharing for threshold KCDSA signature / Ho-Sun Yoon and Heung-Youl Youm -- ".
- catalog title "Information security and cryptology--ICISC'99 : second international conference, Seoul, Korea, December 9-10, 1999 : proceedings / JooSeok Song (ed.).".
- catalog type "Conference proceedings. fast".
- catalog type "text".