出版时间:2005-07-21 出版社:Springer 作者:Park, Choonsik; Chee, Seongtaek; 页数:490
内容概要
This book constitutes the thoroughly refereed postproceedings of the 7th International Conference on Information Security and Cryptology, ICISC 2004, held in Seoul, Korea in December 2004. The 34 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 194 submissions. The papers are organized in topical sections on block ciphers and stream ciphers, public key cryptosystems, PKI and related implementations, digital signatures, elliptic curve cryptosystems, provable security and primitives, network security, steganography, and biometrics.
书籍目录
Invited Talks Security by, and for, Converged Mobile Devices Security for Ubiquitous ComputingBlock Cipher and Stream Cipher Algebraic Attacks on Combiners with Memory and Several Outputs New Method for Bounding the Maximum Differential Probability for SPNs and ARIA Dragon: A Fast Word Based Stream CipherPublic Key Cryptosystem An Efficient and Verifiable Solution to the Millionaire Problem All in the XL Family: Theory and Practice Efficient Broadcast Encryption Using Multiple Interpolation Methods On Private Scalar Product Computation for Privacy-Preserving Data MiningPKI and Related Implementation Separable Implicit Certificate Revocation Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation Improvement on Ha-Moon Randomized Exponentiation Algorithm Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic FieldsDigital Signature On Subliminal Channels in Deterministic Signature Schemes Threshold Entrusted Undeniable Signature On the Security Models of (Threshold) Ring Signature Schemes Identity Based Threshold Ring Signature Batch Verifications with ID-Based SignaturesElliptic Curve Cryptosystem A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations……Network SecurityStegangraphyBiometricsAuthor Index
图书封面
评论、评分、阅读与下载
Information Security and Cryptology - ICISC 2004信息安全与密码术 - ICISC 2004 PDF格式下载