HOME > 상세정보

상세정보

Information security and cryptology--ICISC 2002 : 5th international conference, Seoul, Korea, November 28-29, 2002 : revised papers

Information security and cryptology--ICISC 2002 : 5th international conference, Seoul, Korea, November 28-29, 2002 : revised papers

자료유형
단행본
개인저자
Lee, Pil Joong. Lim, Chae Hoon.
서명 / 저자사항
Information security and cryptology--ICISC 2002 : 5th international conference, Seoul, Korea, November 28-29, 2002 : revised papers / Pil Joong Lee, Chae Hoon Lim (eds.).
발행사항
Berlin ;   New York :   Springer-Verlag,   c2003.  
형태사항
xi, 536 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 2587
ISBN
3540007164 (pbk. : alk. paper) 9783540007166 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Cryptography -- Congresses.
000 01458camuu2200373 a 4500
001 000045561995
005 20091126170941
008 030212s2003 gw a b 101 0 eng
010 ▼a 2003044198
020 ▼a 3540007164 (pbk. : alk. paper)
020 ▼a 9783540007166 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm51726773
035 ▼a (OCoLC)51726773
035 ▼a (KERIS)REF000007011199
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I32 2003
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I16i ▼c 2002
111 2 ▼a ICISC 2002 ▼d (2002 : ▼c Seoul, Korea)
245 1 0 ▼a Information security and cryptology--ICISC 2002 : ▼b 5th international conference, Seoul, Korea, November 28-29, 2002 : revised papers / ▼c Pil Joong Lee, Chae Hoon Lim (eds.).
246 3 0 ▼a ICISC 2002
260 ▼a Berlin ; ▼a New York : ▼b Springer-Verlag, ▼c c2003.
300 ▼a xi, 536 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2587
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Lee, Pil Joong.
700 1 ▼a Lim, Chae Hoon.
830 0 ▼a Lecture notes in computer science ; ▼v 2587.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I16i 2002 등록번호 121186771 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I16i 2002 등록번호 121186784 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

 This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.

The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.



 This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.

The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.




정보제공 : Aladin

목차


CONTENTS
Invited Talk
 Cut-&-Paste Attacks with JAVA / Serge Lefranc ; David Naccache = 1
Digital Signatures
 Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption / Ik Rae Jeong ; Hee Yun Jeong ; Hyun Sook Rhee ; Dong Hoon Lee ; Jong In Lim = 16
 New DSA-Verifiable Signcryption Schemes / Jun-Bum Shin ; Kwangsu Lee ; Kyungah Shim = 35
 Convertible Group Undeniable Signatures / Yuh-Dauh Lyuu ; Ming-Luen Wu = 48
 An Efficient Fail-Stop Signature Scheme Based on Factorization / Willy Susilo ; Rei Safavi-Naini = 62
 On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme / Guilin Wang = 75
Internet Security
 System Specification Based Network Modeling for Survivability Testing Simulation / HyungJong Kim = 90
 A Risk-Sensitive Intrusion Detection Model / Hai Jin ; Jianhua Sun ; Hao Chen ; Zongfen Han = 107
 Applet Verification Strategies for RAM-Constrained Devices / Nils Maltesson ; David Naccache ; Elena Trichina ; Christophe Tymen = 118
Block/Stream Ciphers
 Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks / Raphael Chung-Wei Phan ; Soichi Furuya = 138
 Consistent Differential Patterns of Rijndael / Beomsik Song ; Jennifer Seberry = 149
 Hardware Design and Analysis of Block Cipher Components / Lu Xiao ; Howard M. Heys = 164
 Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt / Nicolas T. Courtois = 182
Stream Ciphers & Other Primitives
 On the Efficiency of the Clock Control Guessing Attack / Erik Zenner = 200
 Balanced Shrinking Generators / Se Ah Choi ; Kyeongcheol Yang = 213
 On the Universal Hash Functions in Luby-Rackoff Cipher / Tetsu Iwata ; Kaoru Kurosawa = 226
 Threshold MACs / Keith M. Martin ; Josef Pieprzyk ; Rei Safavi-Naini ; Huaxiong Wang ; Peter R. Wild = 237
 Ideal Threshold Schemes from MDS Codes / Josef Pieprzyk ; Xian-Mo Zhang = 253
Efficient Implementations
 New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms / Tae-Jun Park ; Mun-Kyu Lee ; Kunsoo Park = 264
 Efficient Computations of the Tate Pairing for the Large MOV Degrees / Tetsuya Izu ; Tsuyoshi Takagi = 283
 Improved Techniques for Fast Exponentiation / Bodo M$$\ddot o$$ller = 298
 Efficient Hardware Multiplicative Inverters / Hyun-Gyu Kim ; Hyeong-Cheol Oh = 313
Side-Channel Attacks
 Ways to Enhance Differential Power Analysis / R$$\acute e$$gis Bevan ; Erik Knudsen = 327
 A Simple Power-Analysis(SPA) Attack on Implementations of the AES Key Expansion / Stefan Mangard = 343
 A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem / Kouichi Sakurai ; Tsuyoshi Takagi = 359
 Hardware Fault Attack on RSA with CRT Revisited / Sung-Ming Yen ; Sangjae Moon ; Jae-Cheol Ha = 374
Cryptographic Protocols Ⅰ
 Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer / Byoungcheon Lee ; Kwangjo Kim = 389
 Non-interactive Auction Scheme with Strong Privacy / Kun Peng ; Colin Boyd ; Ed Dawson ; Kapali Viswanathan = 407
 An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control / Hak Soo Ju ; Hyun Jeong Kim ; Dong Hoon Lee ; Jong In Lira = 421
 Speeding Up Secure Sessions Establishment on the Internet / Yaron Sella = 433
Cryptographic Protocols Ⅱ
 On Fairness in Exchange Protocols / Olivier Markowitch ; Dieter Gollmann ; Steve Kremer = 451
 A Model for Embedding and Authorizing Digital Signatures in Printed Documents / Jae-il Lee ; Taekyoung Kwon ; Sanghoon Song ; Jooseok Song = 465
 A Dynamic Group Key Distribution Scheme with Flexible User Join / Hartono Kurnio ; Luke McAven ; Rei Safavi-Naini ; Huaxiong Wang = 478
 Efficient Multicast Key Management for Stateless Receivers / Ju Hee Ki ; Hyun Jeong Kim ; Dong Hoon Lee ; Chang Seop Park = 497
Biometrics
 Fingerprint Verification System Involving Smart Card / Younhee Gil ; Daesung Moon ; Sungbum Pan ; Yongwha Chung = 510
 A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation / Choonwoo Ryu ; Hakil Kim = 525
Author Index = 535


관련분야 신착자료

Harvard Business Review (2025)