Information and communications security. 1st international conference, ICICS '97, Beijing, China, November 11--14, 1997. Proceedings (Q1373994)

From MaRDI portal





scientific article; zbMATH DE number 1092352
Language Label Description Also known as
English
Information and communications security. 1st international conference, ICICS '97, Beijing, China, November 11--14, 1997. Proceedings
scientific article; zbMATH DE number 1092352

    Statements

    Information and communications security. 1st international conference, ICICS '97, Beijing, China, November 11--14, 1997. Proceedings (English)
    0 references
    27 November 1997
    0 references
    The articles of mathematical interest will be reviewed individually. Indexed articles: \textit{Bellare, Mihir; Rogaway, Phillip}, Minimizing the use of random oracles in authenticated encryption schemes, 1-16 [Zbl 0888.94009] \textit{Di Crescenzo, Giovanni; Sakurai, Kouichi; Yung, Moti}, Zero-knowledge proofs of decision power: New protocols and optimal round- complexity, 17-27 [Zbl 0890.68120] \textit{Koshiba, Takeshi}, Computational learning theoretic cryptanalysis of language theoretic cryptosystems, 28-38 [Zbl 0890.68115] \textit{Bai, Yun; Varadharajan, Vijay}, A language for specifying sequences of authorization transformations and its applications., 39-49 [Zbl 1125.94335] \textit{Sun, Hung-Min; Chen, Bor-Liang}, On the decomposition constructions for perfect secret sharing schemes, 50-60 [Zbl 0903.94033] \textit{Biehl, Ingrid; Wetzel, Susanne}, Traceable visual cryptography. (Extended abstract), 61-71 [Zbl 0890.94031] \textit{Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei}, Remarks on the multiple assignment secret sharing scheme, 72-80 [Zbl 0957.94026] \textit{Charnes, Chris; Martin, Keith; Pieprzyk, Josef; Safavi-Naini, Rei}, Secret sharing in hierarchical groups, 81-86 [Zbl 0903.94029] \textit{Aura, Tuomas; Nikander, Pekka}, Stateless connections, 87-97 [Zbl 0888.94008] \textit{Choi, Rakman; Na, Jungchan; Lee, Kwonil; Kim, Eunmi; Han, Wooyong}, Design of a security platform for CORBA based application., 98-108 [Zbl 1114.68409] \textit{Lioy, Antonio; Maino, Fabio; Mezzalama, Marco}, Secure document management and distribution in an open network environment., 109-117 [Zbl 1114.68416] \textit{Obana, Satoshi; Kurosawa, Kaoru}, \(A^2\)-code = affine resolvable + BIBD, 118-129 [Zbl 0890.94030] \textit{Martin, K. M.; Safavi-Naini, R.}, Multisender authentication systems with unconditional security, 130-143 [Zbl 0888.94019] \textit{Hayashi, Kenichi; Okamoto, Eiji; Mambo, Masahiro}, Proposal of user identification scheme using mouse., 144-148 [Zbl 1114.68412] \textit{Millan, William; Clark, Andrew; Dawson, Ed}, An effective genetic algorithm for finding highly nonlinear Boolean functions, 149-158 [Zbl 0884.94020] \textit{Zhang, Xian-Mo; Zheng, Yuliang; Imai, Hideki}, Duality of Boolean functions and its cryptographic significance, 159-169 [Zbl 0886.94011] \textit{Dawson, Ed; Wu, Chuan-Kun}, Construction of correlation immune Boolean functions, 170-180 [Zbl 0887.94006] \textit{Mihaljević, Miodrag J.}, An improved key stream generator based on the programmable cellular automata, 181-191 [Zbl 0903.94031] \textit{Jøsang, Audun}, A trust policy framework, 192-202 [Zbl 0890.68047] \textit{Chang, Liwu; Moskowitz, Ira S.}, Critical analysis of security in voice hiding techniques, 203-216 [Zbl 0890.68048] \textit{Park, Sangjoon; Park, Sangwoo; Kim, Kwangjo; Won, Dongho}, Two efficient RSA multisignature schemes, 217-222 [Zbl 0885.94024] \textit{Kim, Seungjoo; Park, Sangjoon; Won, Dongho}, Proxy signatures, revisited, 223-232 [Zbl 0890.68049] \textit{Kelsey, John; Schneier, Bruce; Wagner, David}, Related-key cryptoanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA, 233-246 [Zbl 0888.94015] \textit{Zhu, Feng; Guo, Baoan}, A multiplication-addition structure against differential attack, 247-257 [Zbl 0903.94035] \textit{Kaneko, Yasuyoshi; Moriai, Shiho; Ohta, Kazuo}, On strict estimation method of provable security against differential and linear cryptanalysis, 258-268 [Zbl 0903.94030] \textit{Shimoyama, Takeshi; Amada, Seiichi; Moriai, Shiho}, Improved fast software implementation of block ciphers. (Extended abstract), 269-273 [Zbl 0888.94022] \textit{Alabbadi, Mohssen M.}, Security comments on the Hwang-Chen algebraic-code cryptosystem, 274-281 [Zbl 0888.94007] \textit{Miyaji, Atsuko; Ono, Takatoshi; Cohen, Henri}, Efficient elliptic curve exponentiation, 282-290 [Zbl 0897.94013] \textit{Chao, Jinhui; Matsuda, Nori; Tsujii, Shigeo}, Efficient construction of secure hyperelliptic discrete logarithm problems, 291-301 [Zbl 0888.94013] \textit{Bleichenbacher, Daniel; Joye, Marc; Quisquater, Jean-Jacques}, A new and optimal chosen-message attack on RSA-type cryptosystems, 302-313 [Zbl 0890.94026] \textit{Sakai, Yasuyuki; Sakurai, Kouichi; Ishizuka, Hirokazu}, On weak RSA-keys produced from pretty good privacy, 314-324 [Zbl 0888.94021] \textit{Kobara, Kazukuni; Imai, Hideki}, Self-synchronized message randomization methods for subliminal channels, 325-334 [Zbl 0888.94016] \textit{Chapman, Mark; Davida, George}, Hiding the hidden: A software system for concealing ciphertext as innocuous text, 335-345 [Zbl 0890.68050] \textit{Boyd, Colin}, Digital signature and public key cryptosystem in a prime order subgroup of \(\mathbb{Z}_ n^*\), 346-355 [Zbl 0890.94023] \textit{Patarin, Jacques; Goubin, Louis}, Trapdoor one-way permutations and multivariate polynomials, 356-368 [Zbl 0893.94045] \textit{Patarin, Jacques; Goubin, Louis}, Asymmetric cryptography with S-boxes. Is it easier than expected to design efficient asymmetric cryptosystems?, 369-380 [Zbl 0903.94032] \textit{Camion, Paul; Chabanne, Hervé}, On the powerline system, 381-385 [Zbl 0888.94012] \textit{Traoré, Jacques}, Making unfair a ``fair'' blind signature scheme, 386-397 [Zbl 0903.94034] \textit{Boyd, Colin}, Enforcing traceability in software, 398-408 [Zbl 0893.94043] \textit{Mao, Wenbo}, Publicly verifiable partial key escrow, 409-413 [Zbl 0888.94018] \textit{Watanabe, Hajime; Kasami, Tadao}, A secure code for recipient watermarking against conspiracy attacks by all users., 414-423 [Zbl 1114.68420] \textit{Gray, James W. III; Ip, Kin Fai Epsilon}, Protocols for issuing public-key certificates over the internet, 424-434 [Zbl 0890.68051] \textit{Postma, André; Krol, Thijs; Molenkamp, Egbert}, Distributed cryptographic function application protocols, 435-439 [Zbl 0890.68052] \textit{Ogata, Wakaha; Kurosawa, Kaoru; Sako, Kazue; Takatani, Kazunori}, Fault tolerant anonymous channel, 440-444 [Zbl 0888.94020] \textit{Domingo-Ferrer, Josep; Sánchez del Castillo, Ricardo X.}, An implementable scheme for secure delegation of computing and data., 445-451 [Zbl 1114.68410] \textit{Chen, Liqun; Mitchell, Chris J.}, An anonymous and undeniable payment scheme, 478-482 [Zbl 0890.68053]
    0 references
    Beijing (China)
    0 references
    Proceedings
    0 references
    Conference
    0 references
    ICICS '97
    0 references
    Information security
    0 references
    Communications security
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references