Skip to main content
  • Conference proceedings
  • © 2000

Information Security and Cryptology - ICISC'99

Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1787)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

  2. Invited Talk

  3. Cryptanalysis and Cryptographic Design

    1. Correlation Properties of the Bluetooth Combiner

      • Miia Hermelin, Kaisa Nyberg
      Pages 17-29
    2. On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis

      • Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong-In Lim
      Pages 38-52
    3. Non-linear Complexity of the Naor–Reingold Pseudo-random Function

      • William D. Banks, Frances Griffin, Daniel Lieman, Igor E. Shparlinski
      Pages 53-59
  4. Cryptographic Protocol and Authentication Design

    1. Why Hierarchical Key Distribution Is Appropriate for Multicast Networks

      • Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
      Pages 120-131
    2. Secure Selection Protocols

      • Kapali Viswanathan, Colin Boyd, Ed Dawson
      Pages 132-146
    3. Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client

      • Hyoungkyu Lee, Kiwook Sohn, Hyoungkyu Yang, Dongho Won
      Pages 147-155
    4. A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications

      • Kook-Heui Lee, Sang-Jae Moon, Won-Young Jeong, Tae-Geun Kim
      Pages 156-168
  5. Digital Signature and Secret Sharing Scheme

    1. Verifiable Secret Sharing and Time Capsules

      • Josef Pieprzyk, Eiji Okamoto
      Pages 169-183
    2. A New Approach to Robust Threshold RSA Signature Schemes

      • Rei Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam
      Pages 184-196
    3. On Threshold RSA-Signing with no Dealer

      • Shingo Miyazaki, Kouichi Sakurai, Moti Yung
      Pages 197-207
  6. Electronic Cash, Application, Implementation

    1. A Security Design for a Wide-Area Distributed System

      • Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Chandana Gamage, Andrew S. Tanenbaum
      Pages 236-256

Editors and Affiliations

  • Dept. of Computer Science, Yonsei University, Seoul, Korea

    JooSeok Song

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access