E-Book, Englisch, Band 2971, 464 Seiten, eBook
Lim / Lee Information Security and Cryptology - ICISC 2003
Erscheinungsjahr 2004
ISBN: 978-3-540-24691-6
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers
E-Book, Englisch, Band 2971, 464 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-24691-6
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Invited Talk.- Binary Tree Encryption: Constructions and Applications.- Digital Signatures I.- A Separable Threshold Ring Signature Scheme.- On the Security of a Group Signature Scheme with Forward Security.- An Efficient Strong Designated Verifier Signature Scheme.- Primitives.- Sound Computational Interpretation of Formal Encryption with Composed Keys.- On the Security of a New Variant of OMAC.- New Methods to Construct Cheating Immune Functions.- Yet Another Definition of Weak Collision Resistance and Its Analysis.- Fast Implementations.- Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2.- A General Expansion Method Using Efficient Endomorphisms.- Design of Bit Parallel Multiplier with Lower Time Complexity.- Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks.- Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion.- Computer Security/Mobile Security.- Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks.- Extended Role Based Access Control and Procedural Restrictions.- Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System.- Voting/Auction Protocols.- Secure Double Auction Protocols with Full Privacy Protection.- Sealed-Bid Auctions with Efficient Bids.- Providing Receipt-Freeness in Mixnet-Based Voting Protocols.- Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption.- Watermarking.- Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks.- Analysis of the Bounds for Linear Block Codes in Watermark Channel.- Digital Signatures II.- Security Analysis of Some Proxy Signatures.- A More Secure and Efficacious TTS Signature Scheme.- An Efficient RevocationAlgorithm in Group Signatures.- Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.- Authentication/Threshold Protocols.- Group Oriented Cryptosystems Based on Linear Access Structures.- A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters.- Non-interactive Deniable Ring Authentication.- Block/Stream Ciphers.- Differential Cryptanalysis of TEA and XTEA.- A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher.- New Block Cipher: ARIA.- Truncated Differential Attacks on 8-Round CRYPTON.