Table of contents

  1. Front Matter
  2. Detlef Hühnlein, Johannes Merkle
    Pages 14-27
  3. Jaroslaw Pastuszak, Dariusz Michałek, Josef Pieprzyk, Jennifer Seberry
    Pages 28-45
  4. Jianying Zhou, Robert Deng, Feng Bao
    Pages 46-57
  5. Seigo Arita
    Pages 58-67
  6. William D. Banks, Daniel Lieman, Igor E. Shparlinski
    Pages 68-74
  7. Chuchang Liu, Maris A. Ozols, Marie Henderson, Tony Cant
    Pages 75-92
  8. Guillaume Poupard, Jacques Stern
    Pages 147-166
  9. X. Y. Wang, L. C. Hui, K. P. Chow, W. W. Tsang, C. F. Chong, H. W. Chan
    Pages 167-177
  10. Sang Uk Shin, Weon Shin, Kyung Hyune Rhee
    Pages 178-195
  11. Wu Wen, Takamichi Saito, Fumio Mizoguchi
    Pages 196-209
  12. Tetsuya Izu, Jun Kogure, Kazuhiro Yokoyama
    Pages 210-222
  13. Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson
    Pages 223-237
  14. Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai
    Pages 238-257
  15. Ernest Brickell, David Pointcheval, Serge Vaudenay, Moti Yung
    Pages 276-292

About these proceedings

Keywords

Authentication Cryptographic Protocols Digital Signatures Elliptic Curve Cryptography Public Key Cryptography Public Key Cryptosystems Shared Cryptography cryptography security

Editors and affiliations

  • Hideki Imai
    • 1
  • Yuliang Zheng
    • 2
  1. 1.National Institute of Advanced Industrial Science and Technology (AIST)Research Center for Information Security (RCIS) 
  2. 2.Department of Software & Information SystemsThe University of North Carolina at CharlotteCharlotteUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b75033
  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-66967-8
  • Online ISBN 978-3-540-46588-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book