当前位置:首页 > 计算机网络 > 信息安全 > Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (平装)
出版社:1 (2001年4月1日)
出版日期:2000-12
ISBN:9783540417828
作者:Dongho Won
页数:260页
作者简介
在线阅读本书
This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Information Security and Cryptology, ICISC 2000, held in Seoul, Korea, in December 2000.
The 20 revised full papers presented were carefully reviewed and selected from a total of 56 submissions. Among the topics addressed are cryptanalysis, elliptic curve cryptography, cryptographic protocols, block ciphers, hash functions, multi-party protocols, digital signatures, E-commerce, anonymous auction systems, finite field polynomials, anonymous fingerprinting, network security, and security evaluation systems.
length: (cm)23.3 width:(cm)15.4
书籍目录
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block StructuresOn the Strength of KASUMI without FL Functions against Higher Order Differential AttackOn MISTY1 Higher Order Differential CryptanalysisDifference Distribution Attack on DONUT and Improved DONUT New Results on Correlation ImmunityElliptic Curves and Resilient FunctionsFast Universal Hashing with Small Keys and No Preprocessing: The PolyR ConstructionCharacterization of Elliptic Curve Traces under FR-ReductionA Multi-party Optimistic Non-repudiation ProtocolSecure Matchmaking ProtocolAn Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSAEfficient and Secure Member Deletion in Group Signature SchemesAn Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital GoodsAn Internet Anonymous Auction SchemeEfficient Sealed-Bid Auction Using Hash ChainMicropayments for Wireless CommunicationsCryptographic Applications of Sparse Polynomials over Finite RingsEfficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of RedistributorsHash to the Rescue: Space Minimization for PKI DirectoriesA Design of the Security Evaluation System for Decision Support in the Enterprise Network Security ManagementAuthor Index
图书封面