Limit search to available items
Book Cover
Book
Author ICISC 2003 (2003 : Seoul, Korea)

Title Information security and cryptology - ICISC 2003 : 6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers / Jong In Lim, Dong Hoon Lee (eds.)
Published Berlin ; London : Springer, 2004

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Lim/Isa 2003  AVAILABLE
Description xii, 458 pages : illustrations ; 24 cm
4 3/4 in
Series Lecture notes in computer science, 0302-9743 ; 2971
Lecture notes in computer science ; 2971
Contents Machine derived contents note: Invited 'Talk -- -- Binary Tree Encryption: Constructions and Applications -- Jonathan Katz 1 -- -- -- Digital Signatures I -- -- A Separable Threshold Ring Signature Scheme -- Joseph K. Liu, Victor K. Wei, and Duncan S. Wong 12 -- -- On the Security of a Group Signature Scheme with Forward Security -- Guilin Wang 27 -- -- An Efficient Strong Designated Verifier Signature Scheme -- Shahrokh 3aeednia, Steve Kremer, and Olivier Markowitch 40 -- -- -- Primitives -- -- Sound Computational Interpretation of Formal Encryption -- with Composed Keys -- Peeter Laud and Ricardo Corin 55 -- -- On the Security of a New Variant of OMAC -- Tetsu Iwata and Kaoru Kurosawa 67 -- -- New Methods to Construct Cheating Immune Functions -- Wen Ping Ma and Moon Ho Lee 79 -- -- Yet Another Definition of Weak Collision Resistance and Its Analysis -- Shoichi Hirose 87 -- -- -- Fast Implementations -- -- Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2 -- YoungJu Choie and Eunjeong Lee 97 -- -- A General Expansion Method Using Efficient Endomorphisms -- Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, and Kunsoo Park 112 -- I -- -- -- -- -- Design of Bit Parallel Multiplier with Lower Time Complexity -- Seon Ok Lee, Seok Won Jung, Chang Han Kim, Janghong Yoon, -- Jae-Young Koh, and Daeho Kim 127 -- Architecture for an Elliptic Curve Scalar Multiplication Resistant -- to Some Side-Channel Attacks -- Joong Chul Yoon, Seok Won Jung, and Sungwoo Lee 139 -- Efficient Scaar Multiplication in Hyperelliptic Curves -- Using A New Frobenius Expansion -- Tae-Jun Park, Mun-Kyu Lee, and Kunsoo Park 152 -- -- -- Computer Security/Mobile Security -- -- Adaptive Protocol for Entity Authentication and Key Agreement -- in Mobile Networks -- Muxiang Zhang 166 -- Extended Role Based Access Control and Procedural Restrictions -- Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, -- and Jin-Seok Lee 184 -- Layer-Based Access Control Model in the Manufacturing Infrastructure -- and Design Automation System -- Yuan Zhang, Moon Jung Chung, and Hyun Kim 197 -- -- -- Voting/Auction Protocols -- -- Secure Double Auction Protocols with Full Privacy Protection -- Changjie Wang, Ho-fung Leung, and Yumin Wang 215 -- Sealed-Bid Auctions with Efficient Bids -- Toru Nakan'shi, Daisuke Yamamoto, and Yuji Sugiyama 230 -- Providing Receipt-Freeness in Mixnet-Based Voting Protocols -- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, -- Jeongmo Yang, and Seungjae Yoo 245 -- Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption -- Xiaofeng Chen, Byoungcheon Lee, and Kwangjo Kim 259 -- -- -- Watermarking -- -- Software Watermarking Through Register Allocation: Implementation, -- Analysis, and Attacks -- Ginger Myles and Christian Collberg 274 -- Analysis of I he Bounds for Linear Block Codes in Watermark Channel -- Limin Gu, Jiwu Huang, and Zewen Chen 294 -- -- -- -- -- Digital ignatures II -- -- Security Analysis of Some Proxy Signatures -- Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng 305 -- -- A More ecure and Efficacious TTS Signature Scheme -- Jiun-Min Chen and Bo-Yin Yang 320 -- -- An Effici nt Revocation Algorithm in Group Signatures -- Zewen C en, Jilin Wang, Yumin Wang, Jiwu Huang, and Daren Huang.. 339 -- -- Efficient 'orward and Provably Secure ID-Based Signcryption Scheme -- with Pub ic Verifiability and Public Ciphertext Authenticity -- Sherman S.M. Chow, S.M. Yiu, Lucas C.K. Hui, and KP. Chow 352 -- -- -- Authent cation/Threshold Protocols -- -- Group Or ented Cryptosystems Based on Linear Access Structures -- Wen Ping Ma and Moon Ho Lee 370 -- -- A New Al orithm for Searching a Consistent Set of Shares -- in a Thre hold Scheme with Cheaters -- Raylin Ts , Ying Miao, and Eiji Okamotd 377 -- Non-inter ctive Deniable Ring Authentication -- Willy Sus lo and Yi Mu 386 -- -- -- Block/St ream Ciphers -- -- Differenti Cryptanalysis of TEA and XTEA -- Seokhie H ng, Deukjo Hong, Youngdai Ko, Donghoon Chang, -- Wonil Lee, and Sangjin Lee 402 -- -- A Complete Divide and Conquer Attack on the Alphal Stream Cipher -- K. Chen, L. Simpson, M. Henricksen, W. Millan, and E. Dawson 418 -- -- New Block Cipher: ARIA -- Daesung won, Jaesung Kim, Sangwoo Park, Soo Hak Sung, -- Yaekwon ohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, -- Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, and Jin Hong 432 -- Truncated ifferential Attacks on 8-Round CRYPTON -- Jongsung iim, Seokhie Hong, Sangjin Lee, Junghwan Song, -- and Hyung in Yang 446 -- -- -- Author Index 4457
Summary This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers
Analysis Information security
Cryptology
ICISC
Information security
Cryptology
ICISC
Bibliography Includes bibliographical references and index
Notes Also available via the World Wide Web
Mode of access: World Wide Web
Subject Computer science.
Computer networks.
Operating systems (Computers)
Data encryption (Computer science)
Computer software.
Computational complexity.
Information storage and retrieval systems.
Computer security -- Congresses.
Cryptography -- Congresses.
Genre/Form Conference papers and proceedings.
Author Lim, Jong In.
Lee, Dong Hoon.
LC no. 2004102811
ISBN 3540213767 paperback
Other Titles ICISC 2003