Information security and cryptology - ICISC '99. 2nd international conference, Seoul, Korea, December 9--10, 1999. Proceedings (Q1977466)

From MaRDI portal





scientific article; zbMATH DE number 1447415
Language Label Description Also known as
English
Information security and cryptology - ICISC '99. 2nd international conference, Seoul, Korea, December 9--10, 1999. Proceedings
scientific article; zbMATH DE number 1447415

    Statements

    Information security and cryptology - ICISC '99. 2nd international conference, Seoul, Korea, December 9--10, 1999. Proceedings (English)
    0 references
    16 May 2000
    0 references
    The articles of this volume will be reviewed individually. Indexed articles: \textit{Vaudenay, Serge}, On provable security for conventional cryptography, 1-16 [Zbl 1032.94528] \textit{Hermelin, Miia; Nyberg, Kaisa}, Correlation properties of the Bluetooth combiner, 17-29 [Zbl 1032.94511] \textit{Nyang, DaeHun; Song, JooSeok}, Preventing double-spent coins from revealing user's whole secret, 30-37 [Zbl 1032.94520] \textit{Kang, Ju-Sung; Park, Choonsik; Lee, Sangjin; Lim, Jong-In}, On the optimal diffusion layers with practical security against differential and linear cryptanalysis, 38-52 [Zbl 1032.94512] \textit{Banks, William D.; Griffin, Frances; Lieman, Daniel; Shparlinski, Igor E.}, Nonlinear complexity of the Naor-Reingold pseudo-random function, 53-59 [Zbl 1032.94507] \textit{Zheng, Yuliang; Zhang, Xian-Mo}, Relationships between bent functions and complementary plateaued functions, 60-75 [Zbl 1032.94531] \textit{Koshiba, Takeshi}, A technique for boosting the security of cryptographic systems with one-way hash functions, 76-81 [Zbl 1032.94513] \textit{Sakai, Yasuyuki; Sakurai, Kouichi}, Over \(F_p\) vs. over \(F_{2^n}\) and on Pentium vs. on Alpha in software implementation of hyperelliptic curve cryptosystems, 82-101 [Zbl 1032.94525] \textit{Lim, Chae Hoon; Hwang, Hyo Sun}, Speeding up elliptic scalar multiplication with precomputation, 102-119 [Zbl 1032.94517] \textit{Gamage, Chandana; Leiwo, Jussipekka; Zheng, Yuliang}, Why hierarchical key distribution is appropriate for multicast networks, 120-131 [Zbl 1032.94509] \textit{Viswanathan, Kapali; Boyd, Colin; Dawson, Ed}, Secure selection protocols, 132-146 [Zbl 1032.94529] \textit{Lee, Hyoungkyu; Sohn, Kiwook; Yang, Hyoungkyu; Won, Dongho}, The efficient 3-pass password-based key exchange protocol with low computational cost for client, 147-155 [Zbl 1032.94514] \textit{Lee, Kook-Heui; Moon, Sang-Jae; Jeong, Won-Young; Kim, Tae-Geun}, A 2-pass authentication and key agreement protocol for mobile communications, 156-168 [Zbl 1032.94515] \textit{Pieprzyk, Josef; Okamoto, Eiji}, Verifiable secret sharing and time capsules, 169-183 [Zbl 1032.94522] \textit{Safavi-Naini, Rei; Wang, Huaxiong; Lam, Kwok-Yan}, A new approach to robust threshold RSA signature schemes, 184-196 [Zbl 1032.94524] \textit{Miyazaki, Shingo; Sakurai, Kouichi; Yung, Moti}, On threshold RSA-signing with no dealer, 197-207 [Zbl 1032.94519] \textit{Yoon, Ho-Sun; Youm, Heung-Youl}, A new approach to efficient verifiable secret sharing for threshold KCDSA signature, 208-220 [Zbl 1032.94530] \textit{Tamura, Tetsuya; Sakurai, Kouichi; Matsumoto, Tsutomu}, A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems, 221-235 [Zbl 1032.94527] \textit{Leiwo, Jussipekka; Hänle, Christoph; Homburg, Philip; Gamage, Chandana; Tanenbaum, Andrew S.}, A security design for a wide-area distributed system, 236-256 [Zbl 1032.94516] \textit{Paillier, Pascal; Yung, Moti}, Self-escrowed public-key infrastructures, 257-268 [Zbl 1032.94521] \textit{Seo, Moonseog; Kim, Kwangjo}, Electronic funds transfer protocol using domain-verifiable signcryption scheme, 269-277 [Zbl 1032.94526]
    0 references
    Seoul (Korea)
    0 references
    Proceedings
    0 references
    Conference
    0 references
    ICISC '99
    0 references
    Information security
    0 references
    Cryptology
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references