HOME > 상세정보

상세정보

Public key cryptography : First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998 : proceedings

Public key cryptography : First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998 : proceedings

자료유형
단행본
개인저자
Imai, Hideki, 1943-. Zheng, Yuliang, 1962-.
서명 / 저자사항
Public key cryptography : First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998 : proceedings / Hideki Imai, Yuliang Zheng (eds.).
발행사항
Berlin ;   New York :   Springer,   c1998.  
형태사항
xi, 262 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1431
ISBN
3540646930 (pbk. : alk. paper) 9783540646938 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Computers -- Access control -- Congresses. Data encryption (Computer science) -- Congresses. Public key cryptography -- Congresses.
000 02041camuu2200433 a 4500
001 000045561547
005 20091125143349
008 980605s1998 gw a b 101 0 eng
010 ▼a 98026204
020 ▼a 3540646930 (pbk. : alk. paper)
020 ▼a 9783540646938 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm39275799
035 ▼a (OCoLC)39275799
035 ▼a (KERIS)REF000004729169
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b I567 1998
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I61p ▼c 1998
111 2 ▼a International Workshop on Practice and Theory in Public Key Cryptography ▼n (1st : ▼d 1998 : ▼c Yokohama-shi, Japan)
245 1 0 ▼a Public key cryptography : ▼b First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998 : proceedings / ▼c Hideki Imai, Yuliang Zheng (eds.).
246 3 0 ▼a PKC'98
246 3 0 ▼a First International Workshop on Practice and Theory in Public Key Cryptography
246 3 ▼a 1st International Workshop on Practice and Theory in Public Key Cryptography
246 3 0 ▼a International Workshop on Practice and Theory in Public Key Cryptography
246 3 0 ▼a Practice and Theory in Public Key Cryptography
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1998.
300 ▼a xi, 262 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1431
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼x Congresses.
650 0 ▼a Computers ▼x Access control ▼x Congresses.
650 0 ▼a Data encryption (Computer science) ▼x Congresses.
650 0 ▼a Public key cryptography ▼x Congresses.
700 1 ▼a Imai, Hideki, ▼d 1943-.
700 1 ▼a Zheng, Yuliang, ▼d 1962-.
830 0 ▼a Lecture notes in computer science ; ▼v 1431.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I61p 1998 등록번호 121186494 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Distributed public key cryptosystems.- How (not) to design RSA signature schemes.- Overview of elliptic curve cryptography.- Lattices and cryptography: An overview.- A signcryption scheme with signature directly verifiable by public key.- Guaranteed correct sharing of integer factorization with off-line shareholders.- Lower bounds on term-based divisible cash systems.- Certifying trust.- On the security of server-aided RSA protocols.- On the security of ElGamal based encryption.- An authenticated Diffie-Hellman key agreement protocol secure against active attacks.- On the security of Girault's identification scheme.- A scheme for obtaining a message from the digital multisignature.- Secure hyperelliptic cryptosystems and their performance.- A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer.- Two efficient algorithms for arithmetic of elliptic curves using Frobenius map.- Public-key cryptosystems using the modular group.- A cellular automaton based fast one-way hash function suitable for hardware implementation.- A new hash function based on MDx-family and its application to MAC.- Security issues for contactless smart cards.- Parameters for secure elliptic curve cryptosystem -improvements on Schoof s algorithm.- A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme.


정보제공 : Aladin

관련분야 신착자료

이창현 (2021)