Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)

当前位置:首页 > 计算机网络 > 信息安全 > Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)

出版社:1 (2001年4月1日)
出版日期:2000-12
ISBN:9783540417828
作者:Dongho Won
页数:260页

作者简介

在线阅读本书



This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Information Security and Cryptology, ICISC 2000, held in Seoul, Korea, in December 2000.

The 20 revised full papers presented were carefully reviewed and selected from a total of 56 submissions. Among the topics addressed are cryptanalysis, elliptic curve cryptography, cryptographic protocols, block ciphers, hash functions, multi-party protocols, digital signatures, E-commerce, anonymous auction systems, finite field polynomials, anonymous fingerprinting, network security, and security evaluation systems.


length: (cm)23.3                 width:(cm)15.4

书籍目录

A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block StructuresOn the Strength of KASUMI without FL Functions against Higher Order Differential AttackOn MISTY1 Higher Order Differential CryptanalysisDifference Distribution Attack on DONUT and Improved DONUT  New Results on Correlation ImmunityElliptic Curves and Resilient FunctionsFast Universal Hashing with Small Keys and No Preprocessing: The PolyR ConstructionCharacterization of Elliptic Curve Traces under FR-ReductionA Multi-party Optimistic Non-repudiation ProtocolSecure Matchmaking ProtocolAn Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSAEfficient and Secure Member Deletion in Group Signature SchemesAn Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital GoodsAn Internet Anonymous Auction SchemeEfficient Sealed-Bid Auction Using Hash ChainMicropayments for Wireless CommunicationsCryptographic Applications of Sparse Polynomials over Finite RingsEfficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of RedistributorsHash to the Rescue: Space Minimization for PKI DirectoriesA Design of the Security Evaluation System for Decision Support in the Enterprise Network Security ManagementAuthor Index

图书封面


 Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)下载



发布书评

 
 


 

农业基础科学,时尚,美术/书法,绘画,软件工程/开发项目管理,研究生/本专科,爱情/情感,动漫学堂PDF下载,。 PDF下载网 

PDF下载网 @ 2024