This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Security, ISW'98, held in Tatsunokuchi, Ishikawa, Japan, in September 1997. The volume presents six invited surveys together with 25 thoroughly revised full papers selected from 39 submissions. Among the topics covered are public-key cryptosystems, cryptoanalysis, digital signatures, hardware/software implementation, key management, key sharing, security management, electronic commerce, and quantum cryptology.
Author(s): G. R. Blakley, I. Borosh (auth.), Eiji Okamoto, George Davida, Masahiro Mambo (eds.)
Series: Lecture Notes in Computer Science 1396
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1998
Language: English
Pages: 364
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Operating Systems; Algorithms
A general theory of codes, II: Paradigms and homomorphisms....Pages 1-31
Improving the higher order differential attack and cryptanalysis of the KN cipher....Pages 32-42
An optimised linear attack on pseudorandom generators using a non-linear combiner....Pages 43-54
Cryptanalysis of message authentication codes....Pages 55-65
The least witness of a composite number....Pages 66-74
Fast algorithm for finding a small root of a quadratic modular equation....Pages 75-81
Modified Finite Automata Public Key Cryptosystem....Pages 82-95
Modified ElGamal cryptosystem....Pages 96-108
Remarks on blind decryption....Pages 109-115
High-speed cryptography....Pages 116-120
Secure applications of low-entropy keys....Pages 121-134
A key escrow system of the RSA cryptosystem....Pages 135-146
A key escrow system with protecting user's privacy by blind decoding....Pages 147-157
Some recent research aspects of threshold cryptography....Pages 158-173
A high-speed small RSA encryption LSI with low power dissipation....Pages 174-187
The case for a secure multi-application smart card operating system....Pages 188-197
An augmented family of cryptographic Parity Circuits....Pages 198-208
A new byte-oriented block cipher....Pages 209-220
Practice-oriented provable-security....Pages 221-231
A framework for the management of information security....Pages 232-245
Specifying security in a composite system....Pages 246-255
On rough sets and inference analysis....Pages 256-265
Arbitrated unconditionally secure authentication scheme with multi-senders....Pages 266-272
Group signatures for hierarchical multigroups....Pages 273-281
Threshold proxy signature schemes....Pages 282-290
Signcryption and its applications in efficient public key solutions....Pages 291-312
A new digital cash scheme based on blind Nyberg-Rueppel digital signature....Pages 313-320
An incremental payment method for internet based streaming real-time media....Pages 321-327
A new identity-based key exchange protocol minimizing computation and communication....Pages 328-334
The application of ID-based key distribution systems to an elliptic curve....Pages 335-344
On reconciliation of discrepant sequences shared through quantum mechanical channels....Pages 345-356