Information security and cryptology - ICISC 2000. 3rd international conference, Seoul, Korea, December 8--9, 2000. Proceedings (Q5930666)
From MaRDI portal
scientific article; zbMATH DE number 1590203
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Information security and cryptology - ICISC 2000. 3rd international conference, Seoul, Korea, December 8--9, 2000. Proceedings |
scientific article; zbMATH DE number 1590203 |
Statements
Information security and cryptology - ICISC 2000. 3rd international conference, Seoul, Korea, December 8--9, 2000. Proceedings (English)
0 references
23 April 2001
0 references
The articles of mathematical interest will be reviewed individually. Indexed articles: \textit{Kang, Ju-Sung; Chee, Seongtaek; Park, Choonsik}, A note on the higher order differential attack of block ciphers with two-block structures, 1-13 [Zbl 0977.94023] \textit{Tanaka, Hidema; Ishii, Chikashi; Kaneko, Toshinobu}, On the strength of KASUMI without FL functions against higher order differential attack, 14-21 [Zbl 0977.94022] \textit{Babbage, Steve; Frisch, Laurent}, On MISTY1 higher order differential cryptanalysis, 22-36 [Zbl 0977.94020] \textit{Cheon, Dong Hyeon; Hong, Seok Hie; Lee, Sang Jin; Lee, Sung Jae; Park, Kyung Hwan}, Difference distribution attack on DONUT and improved DONUT, 37-48 [Zbl 0977.94017] \textit{Zheng, Yuliang; Zhang, Xian-Mo}, New results on correlation immunity, 49-63 [Zbl 0977.94019] \textit{Cheon, Jung Hee; Chee, Seongtaek}, Elliptic curves and resilient functions, 64-72 [Zbl 0977.94018] \textit{Krovetz, Ted; Rogaway, Phillip}, Fast universal hashing with small keys and no preprocessing: The PolyR construction., 73-79 [Zbl 1037.94543] \textit{Miyaji, Atsuko; Nakabayashi, Masaki; Takano, Shunzo}, Characterization of elliptic curve traces under FR-reduction, 90-108 [Zbl 0990.94024] \textit{Markowitch, Olivier; Kremer, Steve}, A multi-party optimistic non-repudiation protocol, 109-122 [Zbl 0977.94015] \textit{Lee, Byoungcheon; Kim, Kwangjo}, Secure matchmaking protocol, 123-134 [Zbl 0977.94021] \textit{Miyazaki, Takeru}, An improved scheme of the Gennaro-Krawczyk-Rabin undeniable signature system based on RSA, 135-149 [Zbl 0977.94046] \textit{Kim, Hyun-Jeong; Lim, Jong In; Lee, Dong Hoon}, Efficient and secure member deletion in group signature schemes, 150-161 [Zbl 0977.94045] \textit{Bao, Feng; Deng, Robert H.; Feng, Peirong}, An efficient and practical scheme for privacy protection in the e-commerce of digital goods, 162-170 [Zbl 0981.68052] \textit{Mu, Yi; Varadharajan, Vijay}, An internet anonymous auction scheme, 171-182 [Zbl 0977.68535] \textit{Suzuki, Koutarou; Kobayashi, Kunio; Morita, Hikaru}, Efficient sealed-bid auction using hash chain, 183-191 [Zbl 0977.68536] \textit{Park, DongGook; Boyd, Colin; Dawson, Ed}, Micropayments for wireless communications, 192-205 [Zbl 0977.68537] \textit{Banks, William D.; Lieman, Daniel; Shparlinski, Igor E.; To, Van Thuong}, Cryptographic applications of sparse polynomials over finite rings, 206-220 [Zbl 0977.94016] \textit{Chung, Chanjoo; Choi, Seungbok; Choi, Youngchul; Won, Dongho}, Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors, 221-234 [Zbl 0977.94509] \textit{Young, Adam; Yung, Moti}, Hash to the rescue: space minimization for PKI directories, 235-245 [Zbl 0977.94507] \textit{Lee, Jae Seung; Kim, Sang Choon; Sohn, Seung Won}, A design of the security evaluation system for decision support in the enterprise network security management, 246-260 [Zbl 0977.68817]
0 references
Seoul (Korea)
0 references
Proceedings
0 references
Conference
0 references
ICISC 2000
0 references
Information security
0 references
Cryptology
0 references