Information Security and Cryptology - ICISC 2004信息安全与密码术 - ICISC 2004

出版社:Springer
出版日期:2005-07-21
ISBN:9783540262268
作者:Park, Choonsik; Chee, Seongtaek;
页数:490页

书籍目录

Invited Talks  Security by, and for, Converged Mobile Devices Security for Ubiquitous ComputingBlock Cipher and Stream Cipher Algebraic Attacks on Combiners with Memory and Several Outputs New Method for Bounding the Maximum Differential Probability for SPNs and ARIA Dragon: A Fast Word Based Stream CipherPublic Key Cryptosystem An Efficient and Verifiable Solution to the Millionaire Problem All in the XL Family: Theory and Practice Efficient Broadcast Encryption Using Multiple Interpolation Methods On Private Scalar Product Computation for Privacy-Preserving Data MiningPKI and Related Implementation Separable Implicit Certificate Revocation Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation Improvement on Ha-Moon Randomized Exponentiation Algorithm Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic FieldsDigital Signature On Subliminal Channels in Deterministic Signature Schemes Threshold Entrusted Undeniable Signature On the Security Models of (Threshold) Ring Signature Schemes Identity Based Threshold Ring Signature Batch Verifications with ID-Based SignaturesElliptic Curve Cryptosystem A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations……Network SecurityStegangraphyBiometricsAuthor Index

作者简介

This book constitutes the thoroughly refereed postproceedings of the 7th International Conference on Information Security and Cryptology, ICISC 2004, held in Seoul, Korea in December 2004.  The 34 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 194 submissions. The papers are organized in topical sections on block ciphers and stream ciphers, public key cryptosystems, PKI and related implementations, digital signatures, elliptic curve cryptosystems, provable security and primitives, network security, steganography, and biometrics.


 Information Security and Cryptology - ICISC 2004信息安全与密码术 - ICISC 2004下载



发布书评

 
 


 

外国儿童文学,篆刻,百科,生物科学,科普,初中通用,育儿亲子,美容护肤PDF图书下载,。 零度图书网 

零度图书网 @ 2024