信息安全和密码学

信息安全和密码学
作 者: Dongho Won 
出版社: 湖南文艺出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《信息安全和密码学》作者简介

内容简介

Book De*ionThis book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Information Security and Cryptology, ICISC 2000, held in Seoul, Korea, in December 2000.The 20 revised full papers presented were carefully reviewed and selected from a total of 56 submissions. Among the topics addressed are cryptanalysis, elliptic curve cryptography, cryptographic protocols, block ciphers, hash functions, multi-party protocols, digital signatures, E-commerce, anonymous auction systems, finite field polynomials, anonymous fingerprinting, network security, and security evaluation systems.

图书目录

A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures

On the Strength of KASUMI without FL Functions against Higher Order Differential Attack

On MISTY1 Higher Order Differential Cryptanalysis

Difference Distribution Attack on DONUT and Improved DONUT

New Results on Correlation Immunity

Elliptic Curves and Resilient Functions

Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction

Characterization of Elliptic Curve Traces under FR-Reduction

A Multi-party Optimistic Non-repudiation Protocol

Secure Matchmaking Protocol

An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA

Efficient and Secure Member Deletion in Group Signature Schemes

An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods

An Internet Anonymous Auction Scheme

Efficient Sealed-Bid Auction Using Hash Chain

Micropayments for Wireless Communications

Cryptographic Applications of Sparse Polynomials over Finite Rings

Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors

Hash to the Rescue: Space Minimization for PKI Directories

A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management

Author Index