
×
Information Security and Cryptology - ICISC 2004
7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers
herausgegeben von Choonsik Park und Seongtaek CheeInhaltsverzeichnis
- Invited Talks.
- Security by, and for, Converged Mobile Devices.
- Security for Ubiquitous Computing.
- Block Cipher and Stream Cipher.
- Algebraic Attacks on Combiners with Memory and Several Outputs.
- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA.
- Dragon: A Fast Word Based Stream Cipher.
- Public Key Cryptosystem.
- An Efficient and Verifiable Solution to the Millionaire Problem.
- All in the XL Family: Theory and Practice.
- Efficient Broadcast Encryption Using Multiple Interpolation Methods.
- On Private Scalar Product Computation for Privacy-Preserving Data Mining.
- PKI and Related Implementation.
- Separable Implicit Certificate Revocation.
- Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation.
- Improvement on Ha-Moon Randomized Exponentiation Algorithm.
- Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.
- Digital Signature.
- On Subliminal Channels in Deterministic Signature Schemes.
- Threshold Entrusted Undeniable Signature.
- On the Security Models of (Threshold) Ring Signature Schemes.
- Identity Based Threshold Ring Signature.
- Batch Verifications with ID-Based Signatures.
- Elliptic Curve Cryptosystem.
- A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method.
- Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations.
- New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method.
- Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.
- Provable Security and Primitives.
- On the Pseudorandomness of a Modification of KASUMI Type Permutations.
- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model.
- Padding Oracle Attacks on Multiple Modes of Operation.
- An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.
- Network Security.
- Identity-Based Access Control for Ad Hoc Groups.
- Mobile Mixing.
- A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems.
- ADWICE – Anomaly Detection with Real-Time Incremental Clustering.
- Steganography.
- Steganography for Executables and Code Transformation Signatures.
- On Security Notions for Steganalysis.
- A Block Oriented Fingerprinting Scheme in Relational Database.
- Biometrics.
- A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis.
- Profile-Based 3D Face Registration and Recognition.