+612 9045 4394
 
CHECKOUT
Information Security and Cryptology - Icisc 2003 : 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers - Jong In Lim

Information Security and Cryptology - Icisc 2003

6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers

By: Jong In Lim (Editor), Dong Hoon Lee (Editor)

Paperback

Published: 31st March 2004
Ships: 15 business days
15 business days
$160.82
or 4 easy payments of $40.21 with Learn more

This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.

Binary tree encryption : constructions and applicationsp. 1
A separable threshold ring signature schemep. 12
On the security of a group signature scheme with forward securityp. 27
An efficient strong designated verifier signature schemep. 40
Sound computational interpretation of formal encryption with composed keysp. 55
On the security of a new variant of OMACp. 67
New methods to construct cheating immune functionsp. 79
Yet another definition of weak collision resistance and its analysisp. 87
Implementation of Tate pairing on hyperelliptic curves of Genus 2p. 97
A general expansion method using efficient endomorphismsp. 112
Design of bit parallel multiplier with lower time complexityp. 127
Architecture for an elliptic curve scalar multiplication resistant on some side-channel attacksp. 139
Efficient scalar multiplication in hyperelliptic curves using a new Frobenius expansionp. 152
Adaptive protocol for entity authentication and key agreement in mobile networksp. 166
Extended role based access control and procedural restrictionsp. 184
Layer-based access control model in the manufacturing infrastructure and design automation systemp. 197
Secure double auction protocols with full privacy protectionp. 215
Sealed-bid auctions with efficient bidsp. 230
Providing receipt-freeness in mixnet-based voting protocolsp. 245
Receipt-free electronic auction schemes using homomorphic encryptionp. 259
Software watermarking through register allocation : implementation, analysis, and attacksp. 274
Analysis of the bounds of linear block codes in watermark channelp. 294
Security analysis of some proxy signaturesp. 305
A more secure and efficacious TTS signature schemep. 320
An efficient revocation algorithm in group signaturesp. 339
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticityp. 352
Group oriented cryptosystems based on linear access structuresp. 370
A new algorith for searching a consistent set of shares in a threshold scheme with cheatersp. 377
Non-interactive deniable ring authenticationp. 386
Differential cryptanalysis of TEA and XTEAp. 402
A complete divide and conquer attack on the Alpha1 stream cipherp. 418
New block cipher : ARIAp. 432
Truncated differential attacks on 8-round CRYPTONp. 446
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540213765
ISBN-10: 3540213767
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 464
Published: 31st March 2004
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.44
Weight (kg): 0.66