Skip to main content
  • Conference proceedings
  • © 1997

Information and Communications Security

First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1334)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 1997.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (48 papers)

  1. Critical analysis of security in voice hiding techniques

    • LiWu Chang, Ira S. Moskowitz
    Pages 203-216
  2. Two efficient RSA multisignature schemes

    • Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won
    Pages 217-222
  3. Proxy signatures, revisited

    • Seungjoo Kim, Sangjoon Park, Dongho Won
    Pages 223-232
  4. Related-key cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA

    • John Kelsey, Bruce Schneier, David Wagner
    Pages 233-246
  5. Improved fast software implementation of block ciphers (Extended abstract)

    • Takeshi Shimoyama, Seiichi Amada, Shiho Moriai
    Pages 269-273
  6. Efficient elliptic curve exponentiation

    • Atsuko Miyaji, Takatoshi Ono, Henri Cohen
    Pages 282-290
  7. Efficient construction of secure hyperelliptic discrete logarithm problems

    • Jinhui Chao, Nori Matsuda, Shigeo Tsujii
    Pages 291-301
  8. A new and optimal chosen-message attack on RSA-type cryptosystems

    • Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater
    Pages 302-313
  9. On weak RSA-keys produced from pretty good privacy

    • Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizukal
    Pages 314-324
  10. Trapdoor one-way permutations and multivariate polynomials

    • Jacques Patarin, Louis Goubin
    Pages 356-368
  11. On the powerline system

    • Paul Camion, Hervé Chabanne
    Pages 381-385
  12. Enforcing traceability in software

    • Colin Boyd
    Pages 398-408

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997.
The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access