default search action
2. ICISC 1999: Seoul, Korea
- JooSeok Song:
Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings. Lecture Notes in Computer Science 1787, Springer 2000, ISBN 3-540-67380-6
Invited Talk
- Serge Vaudenay:
On Probable Security for Conventional Cryptography. 1-16
Cryptanalysis and Cryptographic Design
- Miia Hermelin, Kaisa Nyberg:
Correlation Properties of the Bluetooth Combiner Generator. 17-29 - DaeHun Nyang, JooSeok Song:
Preventing Double-Spent Coins from Revealing User's Whole Secret. 30-37 - Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim:
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. 38-52 - William D. Banks, Frances Griffin, Daniel Lieman, Igor E. Shparlinski:
Non-linear Complexity of the Naor-Reingold Pseudo-random Function. 53-59
Cryptographic Theory and Computation Complexity
- Yuliang Zheng, Xian-Mo Zhang:
Relationships between Bent Functions and Complementary Plateaued Functions. 60-75 - Takeshi Koshiba:
A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions. 76-81 - Yasuyuki Sakai:
Over Fp vs. over F2n and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems. 82-101 - Chae Hoon Lim, Hyo Sun Hwang:
Speeding Up Elliptic Scalar Multiplication with Precomputation. 102-119
Cryptographic Protocol and Authentication Design
- Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng:
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. 120-131 - Kapali Viswanathan, Colin Boyd, Ed Dawson:
Secure Selection Protocols. 132-146 - Hyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang:
Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. 147-155 - Kook-Heui Lee, Sang-Jae Moon, Won-Young Jeong, Tae-Geun Kim:
A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications. 156-168
Digital Signature and Secret Sharing Scheme
- Josef Pieprzyk, Eiji Okamoto:
Verfiable Secret Sharing and Time Capsules. 169-183 - Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam:
A New Approach to Robust Threshold RSA Signature Schemes. 184-196 - Shingo Miyazaki, Kouichi Sakurai, Moti Yung:
On Threshold RSA-Signing with no Dealer. 197-207 - Ho-Sun Yoon, Heung Youl Youm:
A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature. 208-220
Electronic Cash, Application, Implementation
- Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto:
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. 221-235 - Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Chandana Gamage, Andrew S. Tanenbaum:
A Security Design for a Wide-Area Distributed System. 236-256 - Pascal Paillier, Moti Yung:
Self-Escrowed Public-Key Infrastructures. 257-268 - Moonseog Seo, Kwangjo Kim:
Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. 269-277
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.