Description |
xii, 514 pages : fig., tables ; 24 cm |
Series |
Lecture notes in computer science, 0302-9743 ; 2384 |
|
Lecture notes in computer science ; 2384
|
Contents |
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields / Ingrid Biehl and Tsuyoshi Takagi -- Security Analysis and Improvement of the Global Key Recovery System / Yanjiang Yang, Feng Bao and Robert H. Deng -- The LILI-II Keystream Generator / A. Clark, Ed Dawson, J. Fuller, J. Golic, H.-J. Lee, William Millan, S.-J. Moon and L. Simpson -- A Secure Re-keying Scheme with Key Recovery Property / Hartono Kurnio, Rei Safavi-Naini and Huaxiong Wang -- Modelling Trust, Structures for Public Key Infrastructures / Marie Henderson, Robert Coulter, Ed Dawson and Eiji Okamoto -- Size of Broadcast in Threshold Schemes with Disenrollment / S. G. Barwick, W.-A. Jackson, Keith M. Martin and Peter R. Wild -- Requirements for Group Independent Linear Threshold Secret Sharing Schemes / Brian King -- Efficient Sharing of Encrypted Data / Krista Bennett, Christian Grothoff, Tzvetan Horozov and Ioana Patrascu -- Cheating Prevention in Linear Secret Sharing / Josef Pieprzyk and Xian-Mo Zhang -- Note on Fast Computation of Secret RSA Exponents / Wieland Fischer and Jean-Pierre Seifert -- Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying / Leonid Reyzin and Natan Reyzin -- Cryptanalysis of Stream Cipher COS (2, 128) Mode I / Hongjun Wu and Feng Bao -- The Analysis of Zheng-Seberry Scheme / David Soldera, Jennifer Seberry and Chengxin Qu -- Cryptanalysis of Stream Cipher Alpha1 / Hongjun Wu -- A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem / James Hughes -- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over F[subscript q] / Y. Choie and D. Yun -- Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems / Fangguo Zhang, Shengli Liu and Kwangjo Kim -- A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis / Yvonne Hitchcock and Paul Montague -- Strengthening the Key Schedule of the AES / Lauren May, Matt Henricksen, William Millan, Gary Carter and Ed Dawson -- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes / Ron Steinfeld, Joonsang Baek and Yuliang Zheng -- Security Management: An Information Systems Setting / M. J. Warren and L. M. Batten -- Resolving Conflicts in Authorization Delegations / Chun Ruan and Vijay Varadharajan -- Policy Administration Domains / M. Hitchens, Vijay Varadharajan and G. Saunders -- Maintaining the Validity of Digital Signatures in B2B Applications / Jianying Zhou -- Short 3-Secure Fingerprinting Codes for Copyright Protection / Francesc Sebe and Josep Domingo-Ferrer -- An Order-Specified Multisignature Scheme Secure against Active Insider Attacks / Mitsuru Tada -- Authenticated Operation of Open Computing Devices / Paul England and Marcus Peinado -- A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem / Myungsun Kim and Kwangjo Kim -- A Brief Outline of Research on Correlation Immune Functions / Bimal Roy -- m out of n Oblivious Transfer / Yi Mu, Junqi Zhang and Vijay Varadharajan -- On the Security of Reduced Versions of 3-Pass HAVAL / Sangwoo Park, Soo Hak Sung, Seongtaek Chee and Jongin Lim -- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling / Katsuyuki Okeya and Kouichi Sakurai -- On the Security of a Modified Paillier Public-Key Primitive / Kouichi Sakurai and Tsuyoshi Takagi -- How to Play Sherlock Holmes in the World of Mobile Agents / Biljana Cubaleska, Weidong Qiu and Markus Schneider -- A Practical Approach Defeating Blackmailing / Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee and Hyung-Jim Yang -- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing / Hyun-Jeong Kim, Dong Hoon Lee and Moti Yung -- Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries / M. V. N. Ashwin Kumar, K. Srinathan and C. Pandu Rangan |
Summary |
Constitutes the proceedings of the 7th Australasian Conference on Information Security and Privacy, held in Australia in 2002. The 37 papers cover key handling, trust and secret sharing, fast computation, cryptanalysis, elliptic curves, advanced encryption standard AES, authentication and more |
Bibliography |
Includes bibliographic references and index |
Notes |
Also available in print |
|
Mode of access: World Wide Web |
Subject |
Computer security -- Congresses.
|
|
Data protection -- Congresses.
|
|
Privacy, Right of -- Congresses.
|
Genre/Form |
Conference papers and proceedings.
|
|
Melbourne (2002)
|
|
Conference papers and proceedings.
|
Author |
Seberry, Jennifer, 1944-
|
|
Batten, Lynn Margaret.
|
LC no. |
2002075477 |
ISBN |
3540438610 paperback |
|