Skip to main content
  • Conference proceedings
  • © 1998

Information Security

First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1396)

Conference series link(s): ISW: International Workshop on Information Security

Conference proceedings info: ISW 1997.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

  2. Improving the higher order differential attack and cryptanalysis of the KN cipher

    • Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko
    Pages 32-42
  3. An optimised linear attack on pseudorandom generators using a non-linear combiner

    • Hidema Tanaka, Toinoya Ohishi, Toshinobu Kaneko
    Pages 43-54
  4. The least witness of a composite number

    • R. Balasubramanian, S. V. Nagaraj
    Pages 66-74
  5. Fast algorithm for finding a small root of a quadratic modular equation

    • Hidenori Kuwakado, Hatsukazu Tanaka
    Pages 75-81
  6. Modified Finite Automata Public Key Cryptosystem

    • Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi
    Pages 82-95
  7. Modified ElGamal cryptosystem

    • Daisuke Nakamura, Kunikatsu Kobayashi
    Pages 96-108
  8. Remarks on blind decryption

    • Kazuo Ohta
    Pages 109-115
  9. High-speed cryptography

    • George Davida, René Peralta
    Pages 116-120
  10. Secure applications of low-entropy keys

    • John Kelsey, Bruce Schneier, Chris Hall, David Wagner
    Pages 121-134
  11. A key escrow system of the RSA cryptosystem

    • Yoshiki Sameshima
    Pages 135-146
  12. A key escrow system with protecting user's privacy by blind decoding

    • Kouichi Sakuraii, Yoshinori Yamane, Shingo Miyazaki, Tohru Inoue
    Pages 147-157
  13. A high-speed small RSA encryption LSI with low power dissipation

    • A. Satoh, Y. Kobayashi, H. Niijima, N. Ooba, S. Munetoh, S. Sone
    Pages 174-187
  14. An augmented family of cryptographic Parity Circuits

    • Kenji Koyama, Routo Terada
    Pages 198-208
  15. A new byte-oriented block cipher

    • X. Yi, K. Y. Lam, S. X. Cheng, X. H. You
    Pages 209-220
  16. Practice-oriented provable-security

    • Mihir Bellare
    Pages 221-231

About this book

This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Security, ISW'98, held in Tatsunokuchi, Ishikawa, Japan, in September 1997. The volume presents six invited surveys together with 25 thoroughly revised full papers selected from 39 submissions. Among the topics covered are public-key cryptosystems, cryptoanalysis, digital signatures, hardware/software implementation, key management, key sharing, security management, electronic commerce, and quantum cryptology.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access