default search action
1. ISW 1997: Tatsunokuchi, Japan
- Eiji Okamoto, George I. Davida, Masahiro Mambo:
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings. Lecture Notes in Computer Science 1396, Springer 1998, ISBN 3-540-64382-6
Special Lecture
- G. R. Blakley, I. Borosh:
A General Theory of Codes, II: Paradigms and Homomorphisms. 1-31
Cryptanalysis
- Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko:
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. 32-42 - Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko:
An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. 43-54
Invited Lecture
- Bart Preneel:
Cryptanalysis of Message Authentication Codes. 55-65
Public-Key Cryptography
- R. Balasubramanian, S. V. Nagaraj:
The Least Witness of a Composite Number. 66-74 - Hidenori Kuwadako, Hatsukazu Tanaka:
Fast Algorithm for Finding a Small Root of a Quadratic Modular Equation. 75-81 - Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi:
Modified Finite Automata Public Key Cryptosystem. 82-95 - Daisuke Nakamura, Kunikatsu Kobayashi:
Modified ElGamal Cryptosystem. 96-108 - Kazuo Ohta:
Remarks on Blind Decryption. 109-115
Special Lecture
- George I. Davida, René Peralta:
High-Speed Cryptography. 116-120
Key Management
- John Kelsey, Bruce Schneier, Chris Hall, David A. Wagner:
Secure Applications of Low-Entropy Keys. 121-134 - Yoshiki Sameshima:
A Key Escrow System of the RSA Cryptosystem. 135-146 - Kouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue:
A Key Escrow System with Protecting User's Privacy by Blind Decoding. 147-157
Invited Lecture
- Yvo Desmedt:
Some Recent Research Aspects of Threshold Cryptography. 158-173
Implementation (Hard/Soft)
- Akashi Satoh, Yoshinao Kobayashi, Hideto Niijima, Nobuyuki Ooba, Seiji Munetoh, Sadamichi Sone:
A High-Speed Small RSA Encryption LSI with Low Power Dissipation. 174-187 - Constantinos Markantonakis:
The Case for a Secure Multi-Application Smart Card Operating System. 188-197 - Kenji Koyama, Routo Terada:
An Augmented Family of Cryptographic Parity Circuits. 198-208 - Xun Yi, Kwok-Yan Lam, Shixin Cheng, Xiaohu You:
A New Byte-Oriented Block Cipher. 209-220
Invited Lecture
- Mihir Bellare:
Practice-Oriented Provable-Security. 221-231
Security Management
- Jussipekka Leiwo, Yuliang Zheng:
A Framework for the Management of Information Security. 232-245 - Jean-Marie Kabasele-Tenday:
Specifying Security in a Composite System. 246-255 - Kan Zhang:
On Rough Sets and Inference Analysis. 256-265
Signature/Authentication
- Tzonelih Hwang, Chih-Hung Wang:
Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders. 266-272 - Seungjoo Kim, Sangjoon Park, Dongho Won:
Group Signatures for Hierarchical Multigroups. 273-281 - Kan Zhang:
Threshold Proxy Signature Schemes. 282-290
Invited Lecture
- Yuliang Zheng:
Signcryption and Its Applications in Efficient Public Key Solutions. 291-312
Payment Scheme
- Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. 313-320 - Andreas Fuchsberger:
An Incremental Payment Method for Internet Based Streaming Real-Time Media. 321-327
Key Sharing
- Shahrokh Saeednia, Reihaneh Safavi-Naini:
A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. 328-334 - Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo:
The Application of ID-Based Key Distribution Systems to an Elliptic Curve. 335-344 - Kouichi Yamazaki, Masao Osaki, Osamu Hirota:
On Reconciliation of Discrepant Sequences Shared through Quantum Mechanical Channels. 345-356
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.