Information Security and Cryptology - ICISC 2004 | 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers | ISBN 9783540320838

Information Security and Cryptology - ICISC 2004

7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers

herausgegeben von Choonsik Park und Seongtaek Chee
Mitwirkende
Herausgegeben vonChoonsik Park
Herausgegeben vonSeongtaek Chee
Buchcover Information Security and Cryptology - ICISC 2004  | EAN 9783540320838 | ISBN 3-540-32083-0 | ISBN 978-3-540-32083-8

Information Security and Cryptology - ICISC 2004

7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers

herausgegeben von Choonsik Park und Seongtaek Chee
Mitwirkende
Herausgegeben vonChoonsik Park
Herausgegeben vonSeongtaek Chee

Inhaltsverzeichnis

  • Invited Talks.
  • Security by, and for, Converged Mobile Devices.
  • Security for Ubiquitous Computing.
  • Block Cipher and Stream Cipher.
  • Algebraic Attacks on Combiners with Memory and Several Outputs.
  • New Method for Bounding the Maximum Differential Probability for SPNs and ARIA.
  • Dragon: A Fast Word Based Stream Cipher.
  • Public Key Cryptosystem.
  • An Efficient and Verifiable Solution to the Millionaire Problem.
  • All in the XL Family: Theory and Practice.
  • Efficient Broadcast Encryption Using Multiple Interpolation Methods.
  • On Private Scalar Product Computation for Privacy-Preserving Data Mining.
  • PKI and Related Implementation.
  • Separable Implicit Certificate Revocation.
  • Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation.
  • Improvement on Ha-Moon Randomized Exponentiation Algorithm.
  • Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.
  • Digital Signature.
  • On Subliminal Channels in Deterministic Signature Schemes.
  • Threshold Entrusted Undeniable Signature.
  • On the Security Models of (Threshold) Ring Signature Schemes.
  • Identity Based Threshold Ring Signature.
  • Batch Verifications with ID-Based Signatures.
  • Elliptic Curve Cryptosystem.
  • A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method.
  • Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations.
  • New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method.
  • Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.
  • Provable Security and Primitives.
  • On the Pseudorandomness of a Modification of KASUMI Type Permutations.
  • Provably Secure Double-Block-Length Hash Functions in a Black-Box Model.
  • Padding Oracle Attacks on Multiple Modes of Operation.
  • An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.
  • Network Security.
  • Identity-Based Access Control for Ad Hoc Groups.
  • Mobile Mixing.
  • A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems.
  • ADWICE – Anomaly Detection with Real-Time Incremental Clustering.
  • Steganography.
  • Steganography for Executables and Code Transformation Signatures.
  • On Security Notions for Steganalysis.
  • A Block Oriented Fingerprinting Scheme in Relational Database.
  • Biometrics.
  • A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis.
  • Profile-Based 3D Face Registration and Recognition.