William Millan, Andrew Clark, Ed Dawson (auth.), Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry (eds.)3540657568, 9783540657569
The 26 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The book is divided in topical sections on Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group cryptography, network security, electronic commerce, address control, and odds and ends.
Table of contents :
Boolean Function Design Using Hill Climbing Methods….Pages 1-11
Enumeration of Correlation Immune Boolean Functions….Pages 12-25
On the Symmetric Property of Homogeneous Boolean Functions….Pages 26-35
Publicly Verifiable Key Escrow with Limited Time Span….Pages 36-50
Accelerating Key Establishment Protocols for Mobile Communication….Pages 51-63
Conference Key Agreement from Secret Sharing….Pages 64-76
On m -Permutation Protection Scheme against Modification Attack….Pages 77-87
Inversion Attack and Branching….Pages 88-102
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves….Pages 103-116
Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature….Pages 117-128
Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes….Pages 129-134
On the Security of an RSA Based Encryption Scheme….Pages 135-148
Generalised Cycling Attacks on RSA and Strong RSA Primes….Pages 149-163
RSA Acceleration with Field Programmable Gate Arrays….Pages 164-176
Changing Thresholds in the Absence of Secure Channels….Pages 177-191
A Self-Certified Group-Oriented Cryptosystem without a Combiner….Pages 192-201
Companion Viruses and the Macintosh: Threats and Countermeasures….Pages 202-212
An Implementation of a Secure Version of NFS Including RBAC….Pages 213-227
Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems….Pages 228-243
Effient Electronic Cash Using Batch Signatures….Pages 244-257
Evolution of Fair Non-repudiation with TTP….Pages 258-269
Authorization in Object Oriented Databases….Pages 270-280
An Analysis of Access Control Models….Pages 281-293
Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems….Pages 294-302
Characterization of Optimal Authentication Codes with Arbitration….Pages 303-313
A Functional Cryptosystem Using a Group Action….Pages 314-325
Reviews
There are no reviews yet.