Cargando…

Information Security and Cryptology - ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Park, Choonsik (Editor ), Chee, Seongtaek (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3506
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Talks
  • Security by, and for, Converged Mobile Devices
  • Security for Ubiquitous Computing
  • Block Cipher and Stream Cipher
  • Algebraic Attacks on Combiners with Memory and Several Outputs
  • New Method for Bounding the Maximum Differential Probability for SPNs and ARIA
  • Dragon: A Fast Word Based Stream Cipher
  • Public Key Cryptosystem
  • An Efficient and Verifiable Solution to the Millionaire Problem
  • All in the XL Family: Theory and Practice
  • Efficient Broadcast Encryption Using Multiple Interpolation Methods
  • On Private Scalar Product Computation for Privacy-Preserving Data Mining
  • PKI and Related Implementation
  • Separable Implicit Certificate Revocation
  • Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation
  • Improvement on Ha-Moon Randomized Exponentiation Algorithm
  • Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields
  • Digital Signature
  • On Subliminal Channels in Deterministic Signature Schemes
  • Threshold Entrusted Undeniable Signature
  • On the Security Models of (Threshold) Ring Signature Schemes
  • Identity Based Threshold Ring Signature
  • Batch Verifications with ID-Based Signatures
  • Elliptic Curve Cryptosystem
  • A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method
  • Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations
  • New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method
  • Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors
  • Provable Security and Primitives
  • On the Pseudorandomness of a Modification of KASUMI Type Permutations
  • Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
  • Padding Oracle Attacks on Multiple Modes of Operation
  • An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes
  • Network Security
  • Identity-Based Access Control for Ad Hoc Groups
  • Mobile Mixing
  • A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems
  • ADWICE - Anomaly Detection with Real-Time Incremental Clustering
  • Steganography
  • Steganography for Executables and Code Transformation Signatures
  • On Security Notions for Steganalysis
  • A Block Oriented Fingerprinting Scheme in Relational Database
  • Biometrics
  • A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis
  • Profile-Based 3D Face Registration and Recognition.