Description |
x, 484 pages : illustrations ; 24 cm |
Series |
Lecture notes in computer science, 0302-9743 ; 1334 |
|
Lecture notes in computer science ; 1334
|
Contents |
Minimizing the use of random oracles in authenticated encryption schemes / Mihir Bellare and Phillip Rogaway -- Zero-knowledge proofs of decision power: new protocols and optimal round-complexity / Giovanni Di Crescenzo, Kouichi Sakurai and Moti Yung -- Computational learning theoretic cryptanalysis of language theoretic cryptosystems / Takeshi Koshiba -- A language for specifying sequences of authorization transformations and its applications / Yun Bai and Vijay Varadharajan -- On the decomposition constructions for perfect secret sharing schemes / Hung-Min Sun and Bor-Liang Chen -- Traceable visual cryptography / Ingrid Biehl and Susanne Wetzel -- Remarks on the multiple assignment secret sharing scheme / Hossein Ghodosi, Josef Pieprzyk and Rei Safavi-Naini -- Secret sharing in hierarchical groups / Chris Charnes, Keith Martin and Josef Pieprzyk [et al.] -- Stateless connections / Tuomas Aura and Pekka Nikander -- Design of a security platform for CORBA based application / Rakman Choi, Jungchan Na and Kwonil Lee [et al.] -- Secure document management and distribution in an open network environment / Antonio Lioy, Fabio Maino and Marco Mezzalama -- A[superscript 2] - code = Affine resolvable + BIBD / Satoshi Obana and Kaoru Kurosawa -- Multisender authentication systems with unconditional security / K. M. Martin and Rei Safavi-Naini -- Proposal of user identification scheme using mouse / Kenichi Hayashi, Eiji Okamoto and Masahiro Mambo -- An effective genetic algorithm for finding highly nonlinear Boolean Functions / William Millan, Andrew Clark and Ed Dawson -- Duality of Boolean functions and its cryptographic significance / Xiao-Mo Zhang, Yuliang Zheng and Hideki Imai -- Construction of correlation immune Boolean functions / Ed Dawson and Chuan-Kun Wu -- An improved key stream generator based on the programmable cellular automata / Miodrag J. Mihaljevic -- A Trust policy framework / Audum Josang -- Critical analysis of security in voice hiding techniques / Liwu Chang and S. Moskowitz -- Two efficient RSA multisignature schemes / Sangjoon Park, Sangwoo Park and Kwangjo Kim [et al.] -- Proxy signatures, Revisited / Seungjoo Kim, Sangjoon Park and Dongho Won -- Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA / John Kelsey, Bruce Schneier and David Wagner -- A multiplication-addition structure against differential attack / Feng Zhu and Bao-An Guo -- On strict estimation method of provable security against differential / Yasuyoshi Kaneko, Shiho Moriai and Kazuo Ohta -- Improved fast software implementation of block ciphers / Takeshi Shimoyama, Seiichi Amada and Shiho Moriai -- Security comments on the Hwang-Chen algebraic-code cryptosystem / Mohssen M. Alabbadi -- Efficient elliptic curve exponentiation / Atsuko Miyaji, Takatoshi Ono and Henri Cohen -- Efficient construction of secure hyperelliptic discrete logarithm problems / Jinhui Chao, Nori Matsuda and Shigeo Tsujii -- A new and optimal chosen-message attack on RSA-type cryptosystems / Daniel Bleichenbache, Marc Joye and Jean-Jacques Quisquater -- On weak RSA-keys produced from Pretty Good Privacy / Yasuyuki Sakai, Kouichi Sakurai and Iiirokazu Ishizuka -- Self-synchronized message randomization methods for subliminal channels / Kazukuni Kobara and Hideki Imai -- Hiding the Hidden: A software system for concealing ciphertext as innocuous text / Mark Chapman and George Davida -- Digital signature and public key cryptosystem in a prime order subgroup of Z[subscript n]* / Colin Boyd -- Trapdoor one-way permutations and multivariate polynomials / Jacques Patarin and Louis Goubin -- Asymmetric cryptography with S-Boxes / Jacques Patarin and Louis Goubin -- On the powerline system / Paul Camion and Herve Chabanne -- Making unfair a "fair" blind signature scheme / Jacques Traore -- Enforcing traceability in software / Colin Boyd -- Publicly verifiable partial key escrow / Wenbo Mao -- A secure code for recipient watermarking against conspiracy attacks by all users / Hajime Watanabe and Tadao Kasami -- Protocols for issuing public-key certificates over the Internet / James W. Gray III and Kin Fai Epsilon -- Distributed cryptographic function application protocols / Andre Postma, Thijs Krol and Egbert Molenkamp -- Fault tolerant anonymous channel / Wakaha Ogata, Kaoru Kurosawa and Kazue Sako [et al.] -- An implementable scheme for secure delegation of computing and data / Josep Domingo - Ferrer and Ricardo X. Sanchez del Castillo -- Electronic commerce with secure intelligent trade agent / Jaco van der Merwe and S. H. von Solms -- Efficient scalable fair cash with off-line extortion prevention / Holger Peterson and Guillaume Poupard -- An anonymous and undeniable payment scheme / Liqun Chen and Chris J. Mitchell |
Notes |
ANALYTIC |
|
Includes index |
Bibliography |
Includes bibliographical references and index |
Subject |
Computer security -- Congresses.
|
|
Telecommunication systems -- Security measures -- Congresses.
|
Genre/Form |
Conference papers and proceedings.
|
Author |
Han, Yongfei.
|
|
Okamoto, Tatsuaki.
|
|
Qing, Sihan.
|
|
ICICS (Conference) (1st : 1997 : Beijing, China)
|
LC no. |
97045485 |
ISBN |
354063696X (softcover : alk. paper) |
|