Information Security and Cryptology - ICISC’99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Information Security and Cryptology, ICISC'99, held in Seoul, Korea, in December 1999.
The 20 revised full papers presented together with an invited paper were carefully reviewed and selected from a total of 61 submissions. The book is divided into topical sections on cryptoanalysis and cryptographic design; cryptographic theory and computation complexity; cryptographic protocols and authentication design; digital signatures and secret sharing; and electronic cash, applications, and implementation.

Author(s): Serge Vaudenay (auth.), JooSeok Song (eds.)
Series: Lecture Notes in Computer Science 1787
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2000

Language: English
Pages: 284
Tags: Data Encryption; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Discrete Mathematics in Computer Science

Front Matter....Pages -
On Provable Security for Conventional Cryptography....Pages 1-16
Correlation Properties of the Bluetooth Combiner....Pages 17-29
Preventing Double-Spent Coins from Revealing User’s Whole Secret....Pages 30-37
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis....Pages 38-52
Non-linear Complexity of the Naor–Reingold Pseudo-random Function....Pages 53-59
Relationships between Bent Functions and Complementary Plateaued Functions....Pages 60-75
A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions....Pages 76-81
Over F p vs. over F $_{2^{n}}$ and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems....Pages 82-101
Speeding Up Elliptic Scalar Multiplication with Precomputation....Pages 102-119
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks....Pages 120-131
Secure Selection Protocols....Pages 132-146
Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client....Pages 147-155
A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications....Pages 156-168
Verifiable Secret Sharing and Time Capsules....Pages 169-183
A New Approach to Robust Threshold RSA Signature Schemes....Pages 184-196
On Threshold RSA-Signing with no Dealer....Pages 197-207
A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature....Pages 208-220
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems....Pages 221-235
A Security Design for a Wide-Area Distributed System....Pages 236-256
Self-Escrowed Public-Key Infrastructures....Pages 257-268
Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme....Pages 269-277
Back Matter....Pages -