+612 9045 4394
 
CHECKOUT
Information Security and Privacy : 4th Australasian Conference, Acisp'99, Wollongong, Nsw, Australia, April 7-9, 1999, Proceedings - Josef Pieprzyk

Information Security and Privacy

4th Australasian Conference, Acisp'99, Wollongong, Nsw, Australia, April 7-9, 1999, Proceedings

By: Josef Pieprzyk (Editor), Rei Safavi-Naini (Editor), Jennifer Seberry (Editor)

Paperback Published: 17th March 1999
ISBN: 9783540657569
Number Of Pages: 332

Share This Book:

Paperback

$135.50
or 4 easy payments of $33.88 with Learn more
Ships in 5 to 9 business days

AustralianComputerSociety GeneralChair: JenniferSeberry UniversityofWollongong ProgramCo-Chairs: JosefPieprzyk UniversityofWollongong ReiSafavi-Naini UniversityofWollongong ProgramCommittee: ColinBoyd QueenslandUniversityofTechnology,Australia LawrieBrown AustralianDefenceForceAcademy,Australia BillCaelli QueenslandUniversityofTechnology,Australia EdDawson QueenslandUniversityofTechnology,Australia CunshengDing NationalUniversityofSingapore,Singapore DieterGollmann MicrosoftResearch,UK YongfeiHan Gemplus,Singapore ThomasHardjono BayNetworks,US ErlandJonsson ChalmersUniversity,Sweden SveinKnapskog UniversityofTrondheim,Norway KeithMartin KatholiekeUniversiteitLeuven,Belgium CathyMeadows NavalResearchLaboratory,US KaisaNyberg NokiaResearchCenter,Finland Choon-SikPark ElectronicsandTelecommunicationResearchInstitute,Korea DingyiPei AcademiaSinica,China SteveRoberts WithamPtyLtd,Australia ConferenceOrganization VII GregRose Qualcomm,Australia RaviSandhu GeorgeMasonUniversity,US Sta ordTavares Queen'sUniversity,Canada VijayVaradharajan WesternSydneyUniversity,Australia YuliangZheng MonashUniversity,Australia Referees N. Asokan ZhangJiang DingyiPei YunBai ErlandJonsson JosefPieprzyk SimonBlackburn SveinKnapskog VincentRijmen ColinBoyd HuLei SteveRoberts LawrieBrown LeszekMaciaszek GregRose BillCaelli KeithMartin ReiSafavi-Naini EdDawson CathyMeadows RaviSandhu CunshengDing BillMillan RajanShankaran GaryGaskell QiMing Sta ordTavares JanuszGetta Sang-JaeMoon VijayVaradharajan DieterGollmann YiMu Kapaleeswaran MarcGysin KennyNguyen Viswanathan YongfeiHan KaisaNyberg ChuanWu ThomasHardjono Choon-SikPark YuliangZheng. TableofContents BooleanFunctions BooleanFunctionDesignUsingHillClimbingMethods WilliamMillan,AndrewClark,andEdDawson. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 EnumerationofCorrelationImmuneBooleanFunctions SubhamoyMaitraandPalashSarkar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 OntheSymmetricPropertyofHomogeneousBooleanFunctions ChengxinQu,JenniferSeberry,andJosefPieprzyk. . . . . . . . . . . . . . . . . . . . . . . . 26 KeyManagement PubliclyVeri ableKeyEscrowwithLimitedTimeSpan KapaliViswanathan,ColinBoyd,andEdDawson. . . . . . . . . . . . . . . . . . . . . . . . . 36 AcceleratingKeyEstablishmentProtocolsforMobileCommunication SeungwonLee,Seong-MinHong,HyunsooYoon,andYookunCho. . . . . . . . . 51 ConferenceKeyAgreementfromSecretSharing Chih-HungLiandJosefPieprzyk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Cryptanalysis Onm-PermutationProtectionSchemeAgainstModi cationAttack W. W. FungandJ. W. Gray,III. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 InversionAttackandBranching JovanDj. Golic, AndrewClark,andEdDawson . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Signatures Fail-StopThresholdSignatureSchemesBasedonEllipticCurves WillySusilo,ReiSafavi-Naini,andJosefPieprzyk. . . . . . . . . . . . . . . . . . . . . . . 103 DivertibleZero-KnowledgeProofofPolynomialRelationsand BlindGroupSignature KhanhQuocNguyen,YiMu,andVijayVaradharajan. . . . . . . . . . . . . . . . . . . . 117 RepudiationofCheatingandNon-repudiationof Zhang'sProxySignatureSchemes HosseinGhodosiandJosefPieprzyk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 X TableofContents RSACryptosystems OntheSecurityofanRSABasedEncryptionScheme SigunaMul ¨ler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 GeneralisedCyclingAttacksonRSAandStrongRSAPrimes MarcGysinandJenniferSeberry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 RSAAccelerationwithFieldProgrammableGateArrays AlexanderTiountchikandElenaTrichina. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 GroupCryptography ChangingThresholdsintheAbsenceofSecureChannels KeithM. Martin,JosefPieprzyk,ReiSafavi-Naini,andHuaxiong

Boolean Functions
Boolean Function Design Using Hill Climbing Methodsp. 1
Enumeration of Correlation Immune Boolean Functionsp. 12
On the Symmetric Property of Homogeneous Boolean Functionsp. 26
Key Management
Publicly Verifiable Key Escrow with Limited Time Spanp. 36
Accelerating Key Establishment Protocols for Mobile Communicationp. 51
Conference Key Agreement from Secret Sharingp. 64
Cryptanalysis
On m-Permutation Protection Scheme Against Modification Attackp. 77
Inversion Attack and Branchingp. 88
Signatures
Fail-Stop Threshold Signature Schemes Based on Elliptic Curvesp. 103
Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signaturep. 117
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemesp. 129
RSA Cryptosystems
On the Security of an RSA Based Encryption Schemep. 135
Generalised Cycling Attacks on RSA and Strong RSA Primesp. 149
RSA Acceleration with Field Programmable Gate Arraysp. 164
Group Cryptography
Changing Thresholds in the Absence of Secure Channelsp. 177
A Self-Certified Group-Oriented Cryptosystem Without a Combiner Shahrokh Saeednia and Hossein Ghodosip. 192
Companion Viruses and the Macintosh: Threats and Countermeasuresp. 202
An Implementation of a Secure Version of NFS Including RBACp. 213
Electronic Commerce
Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systemsp. 228
Efficient Electronic Cash Using Batch Signaturesp. 244
Evolution of Fair Non-repudiation with TTPp. 258
Access Control
Authorization in Object Oriented Databasesp. 270
An Analysis of Access Control Modelsp. 281
Odds and Ends
Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystemsp. 294
Characterization of Optimal Authentication Codes with Arbitrationp. 303
A Functional Cryptosystem Using a Group Actionp. 314
Author Indexp. 327
Table of Contents provided by Publisher. All Rights Reserved.

ISBN: 9783540657569
ISBN-10: 3540657568
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 332
Published: 17th March 1999
Publisher: SPRINGER VERLAG GMBH
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 1.83
Weight (kg): 0.49