


default search action
1. ISW 1997: Tatsunokuchi, Japan
- Eiji Okamoto, George I. Davida, Masahiro Mambo:

Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings. Lecture Notes in Computer Science 1396, Springer 1998, ISBN 3-540-64382-6
Special Lecture
- G. R. Blakley, I. Borosh:

A General Theory of Codes, II: Paradigms and Homomorphisms. 1-31
Cryptanalysis
- Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko:

Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. 32-42 - Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko:

An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. 43-54
Invited Lecture
- Bart Preneel:

Cryptanalysis of Message Authentication Codes. 55-65
Public-Key Cryptography
- R. Balasubramanian, S. V. Nagaraj:

The Least Witness of a Composite Number. 66-74 - Hidenori Kuwadako, Hatsukazu Tanaka:

Fast Algorithm for Finding a Small Root of a Quadratic Modular Equation. 75-81 - Feng Bao, Robert H. Deng

, Xiang Gao, Yoshihide Igarashi:
Modified Finite Automata Public Key Cryptosystem. 82-95 - Daisuke Nakamura, Kunikatsu Kobayashi:

Modified ElGamal Cryptosystem. 96-108 - Kazuo Ohta:

Remarks on Blind Decryption. 109-115
Special Lecture
- George I. Davida, René Peralta

:
High-Speed Cryptography. 116-120
Key Management
- John Kelsey

, Bruce Schneier, Chris Hall, David A. Wagner:
Secure Applications of Low-Entropy Keys. 121-134 - Yoshiki Sameshima:

A Key Escrow System of the RSA Cryptosystem. 135-146 - Kouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue:

A Key Escrow System with Protecting User's Privacy by Blind Decoding. 147-157
Invited Lecture
- Yvo Desmedt:

Some Recent Research Aspects of Threshold Cryptography. 158-173
Implementation (Hard/Soft)
- Akashi Satoh, Yoshinao Kobayashi, Hideto Niijima, Nobuyuki Ooba, Seiji Munetoh

, Sadamichi Sone:
A High-Speed Small RSA Encryption LSI with Low Power Dissipation. 174-187 - Constantinos Markantonakis:

The Case for a Secure Multi-Application Smart Card Operating System. 188-197 - Kenji Koyama, Routo Terada:

An Augmented Family of Cryptographic Parity Circuits. 198-208 - Xun Yi

, Kwok-Yan Lam, Shixin Cheng, Xiaohu You:
A New Byte-Oriented Block Cipher. 209-220
Invited Lecture
- Mihir Bellare:

Practice-Oriented Provable-Security. 221-231
Security Management
- Jussipekka Leiwo, Yuliang Zheng

:
A Framework for the Management of Information Security. 232-245 - Jean-Marie Kabasele-Tenday:

Specifying Security in a Composite System. 246-255 - Kan Zhang:

On Rough Sets and Inference Analysis. 256-265
Signature/Authentication
- Tzonelih Hwang, Chih-Hung Wang:

Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders. 266-272 - Seungjoo Kim

, Sangjoon Park, Dongho Won:
Group Signatures for Hierarchical Multigroups. 273-281 - Kan Zhang:

Threshold Proxy Signature Schemes. 282-290
Invited Lecture
- Yuliang Zheng:

Signcryption and Its Applications in Efficient Public Key Solutions. 291-312
Payment Scheme
- Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:

A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. 313-320 - Andreas Fuchsberger:

An Incremental Payment Method for Internet Based Streaming Real-Time Media. 321-327
Key Sharing
- Shahrokh Saeednia, Reihaneh Safavi-Naini:

A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. 328-334 - Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo:

The Application of ID-Based Key Distribution Systems to an Elliptic Curve. 335-344 - Kouichi Yamazaki, Masao Osaki, Osamu Hirota:

On Reconciliation of Discrepant Sequences Shared through Quantum Mechanical Channels. 345-356

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














