rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540433194

Information Security and Cryptology--Icisc 2001

by ;
  • ISBN13:

    9783540433194

  • ISBN10:

    3540433198

  • Format: Paperback
  • Copyright: 2002-04-01
  • Publisher: Springer Verlag
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $109.99 Save up to $90.19
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

Viele Dinge sind schön. Viele Dinge sind nützlich. Aber nur wenige schreiben schon kurz nach ihrem Erscheinen Geschichte. Die Bücher der Reihe 'Design-Klassiker' widmen sich ausgewählten Produkten, die in Form, Funktion und Markenkommunikation neue Maßstäbe setzten. Jeder Band informiert mit zahlreichen Fotos und kurzen, aufschlussreichen Texten über die Geschichte des jeweiligen Kult-Objekts sowie über die Personen, die sie entworfen haben.

Table of Contents

Practical Security in Public-Key Cryptography
1(17)
David Pointcheval
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances
18(14)
Beomsik Song
Huaxiong Wang
Jennifer Seberry
Truncated Differential Cryptanalysis of Camellia
32(7)
Seonhee Lee
Seokhie Hong
Sangjin Lee
Jongin Lim
Seonhee Yoon
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton
39(11)
Jung Hee Cheon
Mun Ju Kim
Kwangjo Kim
Jung-Yeun Lee
Sung Woo Kang
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding
50(1)
Sabine Leveiller
Joseph Boutros
Philippe Guillot
Gilles Zemor
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption
51(21)
Johannes Buchmann
Kouichi Sakurai
Tsuyoshi Takagi
Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm
72(9)
Dug-Hwan Choi
Seungbok Choi
Dongho Won
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring
81(22)
Mototsugu Nishioka
Hisayoshi Satoh
Kouichi Sakurai
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation
103(11)
Jaechul Sung
Sangjin Lee
Jongin Lim
Wonil Lee
Okyeon Yi
Decentralized Event Correlation for Intrusion Detection
114(18)
Christopher Krugel
Thomas Toth
Clemens Kerer
Enhancing the Security of Cookies
132(14)
Vorapranee Khu-smith
Chris Mitchell
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation
146(14)
Yang-Seo Choi
Dong-il Seo
Sung-Won Sohn
Efficient Revocation Schemes for Secure Multicast
160(18)
Hartono Kurnio
Rei Safavi-Naini
Huaxiong Wang
Binary Codes for Collusion-Secure Fingerprinting
178(8)
Gerard Cohen
Simon Litsyn
Gilles Zemor
Copyright Protection of Object-Oriented Software
186(14)
Jarek Pastuszak
Darek Michalek
Josef Pieprzyk
Off Line Authentication Using Watermarks
200(14)
Hyejoung Yoo
Kwangsoo Lee
Sangjin Lee
Jongin Lim
Slide Attacks with a Known-Plaintext Cryptanalysis
214(12)
Soichi Furuya
Constructions of Cheating Immune Secret Sharing
226(18)
Josef Pieprzyk
Xian-Mo Zhang
Private Computation with Shared Randomness over Broadcast Channel
244(14)
Clemente Galdi
Pino Persiano
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
258(10)
Nicolas Gonzalez-Deleito
Olivier Markowitch
Practical Reasoning about Accountability in Electronic Commerce Protocols
268(17)
Supakorn Kungpisdan
Yongyuth Permpoontanalarp
Content Extraction Signatures
285(20)
Ron Steinfeld
Laurence Bull
Yuliang Zheng
New Signcryption Schemes Based on KCDSA
305(13)
Dae Hyun Yum
Pil Joong Lee
An Efficient and Provably Secure Threshold Blind Signature
318(10)
Jinho Kim
Kmangjo Kim
Chulsoo Lee
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks
328(13)
Kei Kawauchi
Hiroshi Minato
Atsuko Miyaji
Mitsuru Tada
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
341(14)
Andre Weimerskirch
Gilles Thonet
Design of an Authentication Protocol for Gsm Javacards
355(14)
Stelvio Cimato
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment
369(13)
Richard Au
Mark Looi
Paul Ashley
Loo Tang Seet
Protecting General Flexible Itineraries of Mobile Agents
382(15)
Joan Mir
Joan Borrell
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
397(17)
Sung-Ming Yen
Seungjoo Kim
Seongan Lim
Sangjae Moon
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
414(14)
Sung-Ming Yen
Seungjoo Kim
Seongan Lim
Sangjae Moon
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks
428(12)
Katsuyuki Okeya
Kunihiko Miyazaki
Kouichi Sakurai
DPA Countermeasure Based on the ``Masking Method
440(17)
Kouichi Itoh
Masahiko Takenaka
Naoga Torii
Author Index 457

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program