Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings
Springer Berlin Heidelberg, Apr 12, 2000 - Computers - 284 pages
The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who wasreviewing which paper. The 23 TPC members ?nallyselected 20 top-quality papers for presentation at ICISC 1999 together with one invited talk. Serge Vaudenay gave an invited talk on “Provable Security for Conventional Crypt- raphy”. Many people contributed to ICISC’99. First of all I would like to thank all the authorswho submitted papers. I amgrateful to the TPC members fortheirhard workreviewing the papers andthe OrganizationCommittee members for all the supporting activities which made ICISC’99 a success. I would like to thank the Ministry of Information and Communication of Korea (MIC) which ?nancially sponsored ICISC’99. Special thanks go to Pil Joong Lee and Heung Youl Youm who helped me during the wholeprocess of preparation for the conference. Last, but notleast, I thank my students, KyuMan Ko, SungkyuChie, andChan Yoon Jung.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Cryptanalysis and Cryptographic Design
Preventing DoubleSpent Coins from Revealing Users Whole Secret
19 other sections not shown
Advances in Cryptology Alpha attack authentication blind signature block cipher Bluetooth cheater client combiner Computer Science correlation cryptographic Cryptology dealer decryption defined denote diffusion layer discrete logarithm double-spending efficient elliptic curve equation exponentiation field multiplications field operations finite field functions on Vp genus GF(p Hamming weight hardware hyperelliptic curve implementation input integer Jacobians Jc(Fp KCDSA key distribution key exchange Lecture Notes Lemma linear subspace LNCS log2p matrix method mod q modular exponentiations multicast non-zero linear structure Notes in Computer number of field object output partial signature participants password Pentium performance permutation plaintext polynomial private key Proceedings proof proposed protocol public key Rijndael robust RSA signature scheme S-boxes safe prime scalar multiplication secret key secret sharing scheme security requirements security subobject self-escrowed sequence signcryption signcryption scheme Springer-Verlag Step Table Theorem valid values verifiable secret sharing Zheng