ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xiaan, China, 13-16 November 2001. Among the preceding conferences, ICICSa97 was held in Beijing, China, 11-14 November 1997 and ICICSa99 in Sydney, Australia, 9-11 November 1999. The ICICSa97 and ICICSa99 proceedings were released as volumes 1334 and 1726 of Springer- Verlagas Lecture Notes in Computer Science series. ICICS 2001 was sponsored by the Chinese Academy of Sciences (CAS), the - tional Natural Science Foundation of China, and the China Computer Fe- ration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Association for Cryptologic Re- arch (IACR), the International Communications and Information Security - sociation (ICISA), and the Asiacrypt Steering Committee. The format of ICICS 2001 was selected to cover the complete spectrum of - formation and communications security, and to promote participant interaction. The sessions were designed to promote interaction between the major topics of the conference: theoretical foundations of security, secret sharing, network - curity, authentication and identi?cation, boolean functions and stream ciphers, security evaluation, signatures, block ciphers and public-key systems, infor- tion hiding, protocols and their analysis, and cryptanalysis. The 29-member Program Committee considered 134 submissions from 23 di- rent countries and regions, among them 56 papers were accepted for presentation.An identification protocol is said secure against the reset attack in the post- processing model if Adv(Post-processing) is ... We consider the following two distributions: a The distribution R4 of random quadruple (g1, g2, u1, u2) a G4, where g1 , ganbsp;...
|Title||:||Information and Communications Security|
|Author||:||Sihan Qing, Tatsuaki Okamoto, Jianying Zhou|
|Publisher||:||Springer Science & Business Media - 2001-10-24|