Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008935254/catalog> ?p ?o. }
Showing items 1 to 34 of
34
with 100 items per page.
- catalog contributor b12547629.
- catalog contributor b12547630.
- catalog created "c2002.".
- catalog date "2002".
- catalog date "c2002.".
- catalog dateCopyrighted "c2002.".
- catalog description "A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks / Katsuyuki Okeya, Kunihiko Miyazaki and Kouichi Sakurai -- DPA Countermeasure Based on the "Masking Method" / Kouichi Itoh, Masahiko Takenaka and Naoya Torii.".
- catalog description "A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks / Kei Kawauchi, Hiroshi Minato and Atsuko Miyaji / [et al.] -- A Distributed Light-Weight Authentication Model for Ad-hoc Networks / Andre Weimerskirch and Gilles Thonet -- Design of an Authentication Protocol for Gsm Javacards / Stelvio Cimato -- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment / Richard Au, Mark Looi and Paul Ashley / [et al.] -- Protecting General Flexible Itineraries of Mobile Agents / Joan Mir and Joan Borrell -- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis / Sung-Ming Yen, Seungjoo Kim and Seongan Lim / [et al.] -- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack / Sung-Ming Yen, Seungjoo Kim and Seongan Lim / [et al.] -- ".
- catalog description "Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring / Mototsugu Nishioka, Hisayoshi Satoh and Kouichi Sakurai -- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation / Jaechul Sung, Sangjin Lee and Jongin Lim / [et al.] -- Decentralized Event Correlation for Intrusion Detection / Christopher Krugel, Thomas Toth and Clemens Kerer -- Enhancing the Security of Cookies / Vorapranee Khu-smith and Chris Mitchell -- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation / Yang-Seo Choi, Dong-il Seo and Sung-Won Sohn -- Efficient Revocation Schemes for Secure Multicast / Hartono Kurnio, Rei Safavi-Naini and Huaxiong Wang -- Binary Codes for Collusion-Secure Fingerprinting / Gerard Cohen, Simon Litsyn and Gilles Zemor -- Copyright Protection of Object-Oriented Software / Jarek Pastuszak, Darek Michalek and Josef Pieprzyk -- ".
- catalog description "Includes bibliographical references and index.".
- catalog description "Off-Line Authentication Using Watermarks / Hyejoung Yoo, Kwangsoo Lee and Sangjin Lee / [et al.] -- Slide Attacks with a Known-Plaintext Cryptanalysis / Soichi Furuya -- Constructions of Cheating Immune Secret Sharing / Josef Pieprzyk and Xian-Mo Zhang -- Private Computation with Shared Randomness over Broadcast Channel / Clemente Galdi and Pino Persiano -- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements / Nicolas Gonzalez-Deleito and Olivier Markowitch -- Practical Reasoning about Accountability in Electronic Commerce Protocols / Supakorn Kungpisdan and Yongyuth Permpoontanalarp -- Content Extraction Signatures / Ron Steinfeld, Laurence Bull and Yuliang Zheng -- New Signcryption Schemes Based on KCDSA / Dae Hyun Yum and Pil Joong Lee -- An Efficient and Provably Secure Threshold Blind Signature / Jinho Kim, Kwangjo Kim and Chulsoo Lee -- ".
- catalog description "Practical Security in Public-Key Cryptography / David Pointcheval -- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances / Beomsik Song, Huaxiong Wang and Jennifer Seberry -- Truncated Differential Cryptanalysis of Camellia / Seonhee Lee, Seokhie Hong and Sangjin Lee / [et al.] -- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton / Jung Hee Cheon, MunJu Kim and Kwangjo Kim / [et al.] -- Cryptanalysis of Nonlinear Filter Generators with {0,1}-Metric Viterbi Decoding / Sabine Leveiller, Joseph Boutros and Philippe Guillot / [et al.] -- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption / Johannes Buchmann, Kouichi Sakurai and Tsuyoshi Takagi -- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm / Dug-Hwan Choi, Seungbok Choi and Dongho Won -- ".
- catalog extent "xiii, 456 p. :".
- catalog hasFormat "Information security and cryptology--ICISC 2001.".
- catalog identifier "3540433198 (pbk. : alk. paper)".
- catalog isFormatOf "Information security and cryptology--ICISC 2001.".
- catalog isPartOf "Lecture notes in computer science ; 2288".
- catalog issued "2002".
- catalog issued "c2002.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog relation "Information security and cryptology--ICISC 2001.".
- catalog subject "005.8 21".
- catalog subject "Computer security Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "QA76.9.A25 I32 2001".
- catalog tableOfContents "A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks / Katsuyuki Okeya, Kunihiko Miyazaki and Kouichi Sakurai -- DPA Countermeasure Based on the "Masking Method" / Kouichi Itoh, Masahiko Takenaka and Naoya Torii.".
- catalog tableOfContents "A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks / Kei Kawauchi, Hiroshi Minato and Atsuko Miyaji / [et al.] -- A Distributed Light-Weight Authentication Model for Ad-hoc Networks / Andre Weimerskirch and Gilles Thonet -- Design of an Authentication Protocol for Gsm Javacards / Stelvio Cimato -- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment / Richard Au, Mark Looi and Paul Ashley / [et al.] -- Protecting General Flexible Itineraries of Mobile Agents / Joan Mir and Joan Borrell -- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis / Sung-Ming Yen, Seungjoo Kim and Seongan Lim / [et al.] -- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack / Sung-Ming Yen, Seungjoo Kim and Seongan Lim / [et al.] -- ".
- catalog tableOfContents "Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring / Mototsugu Nishioka, Hisayoshi Satoh and Kouichi Sakurai -- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation / Jaechul Sung, Sangjin Lee and Jongin Lim / [et al.] -- Decentralized Event Correlation for Intrusion Detection / Christopher Krugel, Thomas Toth and Clemens Kerer -- Enhancing the Security of Cookies / Vorapranee Khu-smith and Chris Mitchell -- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation / Yang-Seo Choi, Dong-il Seo and Sung-Won Sohn -- Efficient Revocation Schemes for Secure Multicast / Hartono Kurnio, Rei Safavi-Naini and Huaxiong Wang -- Binary Codes for Collusion-Secure Fingerprinting / Gerard Cohen, Simon Litsyn and Gilles Zemor -- Copyright Protection of Object-Oriented Software / Jarek Pastuszak, Darek Michalek and Josef Pieprzyk -- ".
- catalog tableOfContents "Off-Line Authentication Using Watermarks / Hyejoung Yoo, Kwangsoo Lee and Sangjin Lee / [et al.] -- Slide Attacks with a Known-Plaintext Cryptanalysis / Soichi Furuya -- Constructions of Cheating Immune Secret Sharing / Josef Pieprzyk and Xian-Mo Zhang -- Private Computation with Shared Randomness over Broadcast Channel / Clemente Galdi and Pino Persiano -- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements / Nicolas Gonzalez-Deleito and Olivier Markowitch -- Practical Reasoning about Accountability in Electronic Commerce Protocols / Supakorn Kungpisdan and Yongyuth Permpoontanalarp -- Content Extraction Signatures / Ron Steinfeld, Laurence Bull and Yuliang Zheng -- New Signcryption Schemes Based on KCDSA / Dae Hyun Yum and Pil Joong Lee -- An Efficient and Provably Secure Threshold Blind Signature / Jinho Kim, Kwangjo Kim and Chulsoo Lee -- ".
- catalog tableOfContents "Practical Security in Public-Key Cryptography / David Pointcheval -- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances / Beomsik Song, Huaxiong Wang and Jennifer Seberry -- Truncated Differential Cryptanalysis of Camellia / Seonhee Lee, Seokhie Hong and Sangjin Lee / [et al.] -- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton / Jung Hee Cheon, MunJu Kim and Kwangjo Kim / [et al.] -- Cryptanalysis of Nonlinear Filter Generators with {0,1}-Metric Viterbi Decoding / Sabine Leveiller, Joseph Boutros and Philippe Guillot / [et al.] -- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption / Johannes Buchmann, Kouichi Sakurai and Tsuyoshi Takagi -- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm / Dug-Hwan Choi, Seungbok Choi and Dongho Won -- ".
- catalog title "Information security and cryptology--ICISC 2001 : 4th international conference, Seoul, Korea, December 6-7, 2001 : proceedings / Kwangjo Kim (ed.)".
- catalog type "Conference proceedings. fast".
- catalog type "text".