The Resource Information security and cryptology : ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings, Dongho Won (ed.)

Information security and cryptology : ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings, Dongho Won (ed.)

Label
Information security and cryptology : ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings
Title
Information security and cryptology
Title remainder
ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings
Statement of responsibility
Dongho Won (ed.)
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
DLC
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I32 2000
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2000
http://bibfra.me/vocab/lite/meetingName
ICISC (Conference)
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1949-
http://library.link/vocab/relatedWorkOrContributorName
Won, Dongho
http://library.link/vocab/subjectName
  • Computer security
  • Cryptography
  • signature numérique
  • sécurité réseau
  • cryptographie
  • sécurité information
  • Systèmes informatiques
  • Cryptographie
  • Computer security
  • Cryptography
  • Databescherming
  • Geheimschrift
  • Cryptographie
  • Protection de l'information (informatique)
  • Kryptologie
  • Kryptosystem
  • Seoul <2000>
Label
Information security and cryptology : ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings, Dongho Won (ed.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • New results on correlation immunity
  • Yuliang Zheng, Xian-Mo Zhang
  • Elliptic curves and resilient functions
  • Jung Hee Cheon, Seongtaek Chee
  • Fast universal hashing with small keys and no preprocessing: the polyR construction
  • Ted Krovetz, Phillip Rogaway
  • Characterization of elliptic curve traces under FR-reduction
  • Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano
  • Multi-party optimistic non-repudiation protocol
  • Olivier Markowitch, Steve Kremer
  • Note on the higher order differential attack of block ciphers with two-block structures
  • Secure Matchmaking protocol
  • Byoungcheon Lee, Kwangjo Kim
  • Improved sheme of the gennaro-krawczyk-rabin undeniable signature system based on RSA
  • Takeru Miyazaki
  • Efficient and secure member deletion in group signature schemes
  • Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee
  • Efficient and practical scheme for privacy protection in the E-commerce of digital goods
  • Feng Bao, Robert H. Deng, Peirong Feng
  • Internet anonymous auction scheme
  • Yi Mu, Vijay Varadharajan
  • Ju-Sung Kang, Seongtaek Chee, Choonsik Park
  • Efficient sealed-bid auction using hash chain
  • Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita
  • Micropayments for wireless communications
  • DongGook Park, Colin Boyd, Ed Dawson
  • Cryptographic applications of sparse polynomials over finite rings
  • William D. Banks [and others]
  • Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors
  • Chanjoo Chung [and others]
  • Hash to the rescue: space minimization for PKI directories
  • Adam Young
  • On the strength of KASUMI withour FL functions against higher order differential attack
  • Design of the security evaluation system for decision support in the enterprise network security management
  • Jae Seung Lee, Sang Choon Kim, Seung Won Sohn
  • Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko
  • On MISTY1 higher order differential cryptanalysis
  • Steve Babbage, Laurent Frisch
  • Difference distribution attack on DONUT and improved DONUT
  • Dong Hyeon Cheon [and others]
Dimensions
24 cm.
Dimensions
unknown
Extent
x, 260 pages
Isbn
9783540417828
Lccn
2001020503
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)46359462
  • (OCoLC)ocm46359462
Label
Information security and cryptology : ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings, Dongho Won (ed.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • New results on correlation immunity
  • Yuliang Zheng, Xian-Mo Zhang
  • Elliptic curves and resilient functions
  • Jung Hee Cheon, Seongtaek Chee
  • Fast universal hashing with small keys and no preprocessing: the polyR construction
  • Ted Krovetz, Phillip Rogaway
  • Characterization of elliptic curve traces under FR-reduction
  • Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano
  • Multi-party optimistic non-repudiation protocol
  • Olivier Markowitch, Steve Kremer
  • Note on the higher order differential attack of block ciphers with two-block structures
  • Secure Matchmaking protocol
  • Byoungcheon Lee, Kwangjo Kim
  • Improved sheme of the gennaro-krawczyk-rabin undeniable signature system based on RSA
  • Takeru Miyazaki
  • Efficient and secure member deletion in group signature schemes
  • Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee
  • Efficient and practical scheme for privacy protection in the E-commerce of digital goods
  • Feng Bao, Robert H. Deng, Peirong Feng
  • Internet anonymous auction scheme
  • Yi Mu, Vijay Varadharajan
  • Ju-Sung Kang, Seongtaek Chee, Choonsik Park
  • Efficient sealed-bid auction using hash chain
  • Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita
  • Micropayments for wireless communications
  • DongGook Park, Colin Boyd, Ed Dawson
  • Cryptographic applications of sparse polynomials over finite rings
  • William D. Banks [and others]
  • Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors
  • Chanjoo Chung [and others]
  • Hash to the rescue: space minimization for PKI directories
  • Adam Young
  • On the strength of KASUMI withour FL functions against higher order differential attack
  • Design of the security evaluation system for decision support in the enterprise network security management
  • Jae Seung Lee, Sang Choon Kim, Seung Won Sohn
  • Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko
  • On MISTY1 higher order differential cryptanalysis
  • Steve Babbage, Laurent Frisch
  • Difference distribution attack on DONUT and improved DONUT
  • Dong Hyeon Cheon [and others]
Dimensions
24 cm.
Dimensions
unknown
Extent
x, 260 pages
Isbn
9783540417828
Lccn
2001020503
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)46359462
  • (OCoLC)ocm46359462

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...