Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_361726236
    Format: XI, 536 S. , Ill., graph. Darst.
    ISBN: 3540007164
    Series Statement: Lecture notes in computer science 2587
    Note: Literaturangaben
    Additional Edition: Erscheint auch als Online-Ausgabe Lee, Pil Joong Information Security and Cryptology — ICISC 2002 Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2003 ISBN 9783540365525
    Additional Edition: ISBN 3540007164
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    RVK:
    Keywords: Kryptologie ; Kryptosystem ; Public-Key-Kryptosystem ; Kryptologie ; Kryptosystem ; Elektronische Unterschrift ; Stromchiffre ; Konferenzschrift ; Kongress ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947920457702882
    Format: XII, 544 p. , online resource.
    ISBN: 9783540365525
    Series Statement: Lecture Notes in Computer Science, 2587
    Content: This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.
    Note: Invited Talk -- Cut-&-Paste Attacks with JAVA -- Digital Signatures -- Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption -- New DSA-Verifiable Signcryption Schemes -- Convertible Group Undeniable Signatures -- An Efficient Fail-Stop Signature Scheme Based on Factorization -- On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme -- Internet Security -- System Specification Based Network Modeling for Survivability Testing Simulation -- A Risk-Sensitive Intrusion Detection Model -- Applet Verification Strategies for RAM-Constrained Devices -- Block/Stream Ciphers -- Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks -- Consistent Differential Patterns of Rijndael -- Hardware Design and Analysis of Block Cipher Components -- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt -- Stream Ciphers & Other Primitives -- On the Efficiency of the Clock Control Guessing Attack -- Balanced Shrinking Generators -- On the Universal Hash Functions in Luby-Rackoff Cipher -- Threshold MACs -- Ideal Threshold Schemes from MDS Codes -- Efficient Implementations -- New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms -- Efficient Computations of the Tate Pairing for the Large MOV Degrees -- Improved Techniques for Fast Exponentiation -- Efficient Hardware Multiplicative Inverters -- Side-Channel Attacks -- Ways to Enhance Differential Power Analysis -- A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion -- A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem -- Hardware Fault Attack on RSA with CRT Revisited -- Cryptographic Protocols I -- Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer -- Non-interactive Auction Scheme with Strong Privacy -- An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control -- Speeding Up Secure Sessions Establishment on the Internet -- Cryptographic Protocols II -- On Fairness in Exchange Protocols -- A Model for Embedding and Authorizing Digital Signatures in Printed Documents -- A Dynamic Group Key Distribution Scheme with Flexible User Join -- Efficient Multicast Key Management for Stateless Receivers -- Biometrics -- Fingerprint Verification System Involving Smart Card -- A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540007166
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9948621718702882
    Format: XII, 544 p. , online resource.
    Edition: 1st ed. 2003.
    ISBN: 9783540365525
    Series Statement: Lecture Notes in Computer Science, 2587
    Content: This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.
    Note: Invited Talk -- Cut-&-Paste Attacks with JAVA -- Digital Signatures -- Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption -- New DSA-Verifiable Signcryption Schemes -- Convertible Group Undeniable Signatures -- An Efficient Fail-Stop Signature Scheme Based on Factorization -- On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme -- Internet Security -- System Specification Based Network Modeling for Survivability Testing Simulation -- A Risk-Sensitive Intrusion Detection Model -- Applet Verification Strategies for RAM-Constrained Devices -- Block/Stream Ciphers -- Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks -- Consistent Differential Patterns of Rijndael -- Hardware Design and Analysis of Block Cipher Components -- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt -- Stream Ciphers & Other Primitives -- On the Efficiency of the Clock Control Guessing Attack -- Balanced Shrinking Generators -- On the Universal Hash Functions in Luby-Rackoff Cipher -- Threshold MACs -- Ideal Threshold Schemes from MDS Codes -- Efficient Implementations -- New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms -- Efficient Computations of the Tate Pairing for the Large MOV Degrees -- Improved Techniques for Fast Exponentiation -- Efficient Hardware Multiplicative Inverters -- Side-Channel Attacks -- Ways to Enhance Differential Power Analysis -- A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion -- A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem -- Hardware Fault Attack on RSA with CRT Revisited -- Cryptographic Protocols I -- Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer -- Non-interactive Auction Scheme with Strong Privacy -- An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control -- Speeding Up Secure Sessions Establishment on the Internet -- Cryptographic Protocols II -- On Fairness in Exchange Protocols -- A Model for Embedding and Authorizing Digital Signatures in Printed Documents -- A Dynamic Group Key Distribution Scheme with Flexible User Join -- Efficient Multicast Key Management for Stateless Receivers -- Biometrics -- Fingerprint Verification System Involving Smart Card -- A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662186824
    Additional Edition: Printed edition: ISBN 9783540007166
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_1649190867
    Format: Online-Ressource
    ISBN: 9783540365525 , 3540007164
    Series Statement: Lecture Notes in Computer Science 2587
    Content:  This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics
    Additional Edition: ISBN 9783540007166
    Additional Edition: Buchausg. u.d.T. Information security and cryptology Berlin : Springer, 2003 ISBN 3540007164
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Kryptosystem ; Elektronische Unterschrift ; Stromchiffre ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV016876992
    Format: XI, 536 S. , Ill., graph. Darst.
    ISBN: 3540007164
    Series Statement: Lecture notes in computer science 2587
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almafu_BV016876992
    Format: XI, 536 S. : Ill., graph. Darst.
    ISBN: 3-540-00716-4
    Series Statement: Lecture notes in computer science 2587
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783540000716?
Did you mean 9783540004165?
Did you mean 9783540006466?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages