Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9948621458702882
    Format: XII, 284 p. , online resource.
    Edition: 1st ed. 2000.
    ISBN: 9783540455684
    Series Statement: Lecture Notes in Computer Science, 1787
    Note: Invited Talk -- On Provable Security for Conventional Cryptography -- Cryptanalysis and Cryptographic Design -- Correlation Properties of the Bluetooth Combiner -- Preventing Double-Spent Coins from Revealing User's Whole Secret -- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis -- Non-linear Complexity of the Naor-Reingold Pseudo-random Function -- Cryptographic Theory and Computation Complexity -- Relationships between Bent Functions and Complementary Plateaued Functions -- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions -- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems -- Speeding Up Elliptic Scalar Multiplication with Precomputation -- Cryptographic Protocol and Authentication Design -- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks -- Secure Selection Protocols -- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client -- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications -- Digital Signature and Secret Sharing Scheme -- Verifiable Secret Sharing and Time Capsules -- A New Approach to Robust Threshold RSA Signature Schemes -- On Threshold RSA-Signing with no Dealer -- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature -- Electronic Cash, Application, Implementation -- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems -- A Security Design for a Wide-Area Distributed System -- Self-Escrowed Public-Key Infrastructures -- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662190739
    Additional Edition: Printed edition: ISBN 9783540673804
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_749225920
    Format: Online-Ressource (XI, 279 pp) , digital
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783540455684 , 3540673806 , 9783540673804
    Series Statement: Lecture Notes in Computer Science 1787
    Content: This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Information Security and Cryptology, ICISC'99, held in Seoul, Korea, in December 1999. The 20 revised full papers presented together with an invited paper were carefully reviewed and selected from a total of 61 submissions. The book is divided into topical sections on cryptoanalysis and cryptographic design; cryptographic theory and computation complexity; cryptographic protocols and authentication design; digital signatures and secret sharing; and electronic cash, applications, and implementation
    Note: Literaturangaben
    Additional Edition: ISBN 9783540673804
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662190739
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783540673804
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Kongress ; Kryptosystem ; Elektronischer Zahlungsverkehr ; Datensicherung ; Elektronische Unterschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783642390739?
Did you mean 9783642190735?
Did you mean 9783662100639?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages