## Information Security: First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, ProceedingsThis book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Security, ISW'98, held in Tatsunokuchi, Ishikawa, Japan, in September 1997. The volume presents six invited surveys together with 25 thoroughly revised full papers selected from 39 submissions. Among the topics covered are public-key cryptosystems, cryptoanalysis, digital signatures, hardware/software implementation, key management, key sharing, security management, electronic commerce, and quantum cryptology. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Cryptanalysis | 32 |

An Optimised Linear Attack on Pseudorandom Generators Using | 43 |

Invited Lecture | 55 |

Copyright | |

10 other sections not shown

### Other editions - View all

### Common terms and phrases

Advances in Cryptology algorithm Alice Alice and Bob application assume attack bits block cipher calculate ciphertexts circuit communication composite number Computer Science cryptanalysis Crypto cryptography Cryptology database decryption defined denotes Desmedt digital signature discrete logarithm problem efficient elliptic curve encryption equation finite group signature hash function IEEE implementation information security input Java KEAs key escrow key stretching key subblocks KM cipher layer Lecture Notes linear LNCS material implications method modular exponentiations non-affineness Notes in Computer Nyberg-Rueppel operation optimal output pair paper payment plaintext polynomial precode precode homomorphism prime Proceedings proof properties proposed provable security proxy signature schemes proxy signer pseudorandom random number recipient requirements result rough sets round S-boxes secret key Section sender sends sequence signature key signature-then-encryption signcryption signcryption schemes smart card Springer-Verlag Theorem theory threshold user's valid verify WIFA with delay