ti.\*:("Information security (Ishikawa, 17-19 September 1997)")
Results 1 to 25 of 32
Selection :
Information security (Ishikawa, 17-19 September 1997)Okamoto, Eiji; Davida, George; Mambo, Masahiro et al.Lecture notes in computer science. 1998, issn 0302-9743, isbn 3-540-64382-6, XII, 356 p, isbn 3-540-64382-6Conference Proceedings
High-speed cryptographyDAVIDA, G; PERALTA, R.Lecture notes in computer science. 1998, pp 116-120, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Modified ElGamal cryptosystemNAKAMURA, D; KOBAYASHI, K.Lecture notes in computer science. 1998, pp 96-108, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Remarks on blind decryptionOHTA, K.Lecture notes in computer science. 1998, pp 109-115, issn 0302-9743, isbn 3-540-64382-6Conference Paper
A key escrow system of the RSA cryptosystemSAMESHIMA, Y.Lecture notes in computer science. 1998, pp 135-146, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Modified finite Automata Public Key CryptosystemFENG BAO; DENG, R. H; XIANG GAO et al.Lecture notes in computer science. 1998, pp 82-95, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Some recent research aspects of threshold cryptographyDESMEDT, Y.Lecture notes in computer science. 1998, pp 158-173, issn 0302-9743, isbn 3-540-64382-6Conference Paper
A key escrow system with protecting user's privacy by blind decodingSAKURAI, K; YAMANE, Y; MIYAZAKI, S et al.Lecture notes in computer science. 1998, pp 147-157, issn 0302-9743, isbn 3-540-64382-6Conference Paper
The least witness of a composite numberBALASUBRAMANIAN, R; NAGARAJ, S. V.Lecture notes in computer science. 1998, pp 66-74, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Arbitrated unconditionally secure authentication scheme with multi-sendersHWANG, T; WANG, C.-H.Lecture notes in computer science. 1998, pp 266-272, issn 0302-9743, isbn 3-540-64382-6Conference Paper
On rough sets and inference analysisKAN ZHANG.Lecture notes in computer science. 1998, pp 256-265, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Specifying security in a composite systemKABASELE-TENDAY, J.-M.Lecture notes in computer science. 1998, pp 246-255, issn 0302-9743, isbn 3-540-64382-6Conference Paper
On reconciliation of discrepant sequences shared through quantum mechanical channelsYAMAZAKI, K; OSAKI, M; HIROTA, O et al.Lecture notes in computer science. 1998, pp 345-356, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Secure applications of low-entropy keysKELSEY, J; SCHNEIER, B; HALL, C et al.Lecture notes in computer science. 1998, pp 121-134, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Signcryption and its applications in efficient public key solutionsZHENG, Y.Lecture notes in computer science. 1998, pp 291-312, issn 0302-9743, isbn 3-540-64382-6Conference Paper
A framework for the management of information securityLEIWO, J; ZHENG, Y.Lecture notes in computer science. 1998, pp 232-245, issn 0302-9743, isbn 3-540-64382-6Conference Paper
A general theory of codes, II : Paradigms and homomorphismsBLAKLEY, G. R; BOROSH, I.Lecture notes in computer science. 1998, pp 1-31, issn 0302-9743, isbn 3-540-64382-6Conference Paper
An augmented family of cryptographic Parity CircuitsKOYAMA, K; TERADA, R.Lecture notes in computer science. 1998, pp 198-208, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Cryptanalysis of Message authentication CodesPRENEEL, B.Lecture notes in computer science. 1998, pp 55-65, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Improving the higher order differential attack and cryptanalysis of the KN cipherSHIMOYAMA, T; MORIAI, S; KANEKO, T et al.Lecture notes in computer science. 1998, pp 32-42, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Threshold proxy signature schemesKAN ZHANG.Lecture notes in computer science. 1998, pp 282-290, issn 0302-9743, isbn 3-540-64382-6Conference Paper
A new byte-oriented block cipherYI, X; LAM, K. Y; CHENG, S. X et al.Lecture notes in computer science. 1998, pp 209-220, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Group signatures for hierarchical multigroupsSEUNGJOO KIM; SANGJOON PARK; DONGHO WON et al.Lecture notes in computer science. 1998, pp 273-281, issn 0302-9743, isbn 3-540-64382-6Conference Paper
Practice-oriented provable-securityBELLARE, M.Lecture notes in computer science. 1998, pp 221-231, issn 0302-9743, isbn 3-540-64382-6Conference Paper
The application of ID-based key distribution systems to an elliptic curveSAKAZAKI, H; OKAMOTO, E; MAMBO, M et al.Lecture notes in computer science. 1998, pp 335-344, issn 0302-9743, isbn 3-540-64382-6Conference Paper