Information Security and Cryptology – ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2005.
|
Σειρά: | Lecture Notes in Computer Science,
3506 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talks
- Security by, and for, Converged Mobile Devices
- Security for Ubiquitous Computing
- Block Cipher and Stream Cipher
- Algebraic Attacks on Combiners with Memory and Several Outputs
- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA
- Dragon: A Fast Word Based Stream Cipher
- Public Key Cryptosystem
- An Efficient and Verifiable Solution to the Millionaire Problem
- All in the XL Family: Theory and Practice
- Efficient Broadcast Encryption Using Multiple Interpolation Methods
- On Private Scalar Product Computation for Privacy-Preserving Data Mining
- PKI and Related Implementation
- Separable Implicit Certificate Revocation
- Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation
- Improvement on Ha-Moon Randomized Exponentiation Algorithm
- Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields
- Digital Signature
- On Subliminal Channels in Deterministic Signature Schemes
- Threshold Entrusted Undeniable Signature
- On the Security Models of (Threshold) Ring Signature Schemes
- Identity Based Threshold Ring Signature
- Batch Verifications with ID-Based Signatures
- Elliptic Curve Cryptosystem
- A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method
- Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations
- New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method
- Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors
- Provable Security and Primitives
- On the Pseudorandomness of a Modification of KASUMI Type Permutations
- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
- Padding Oracle Attacks on Multiple Modes of Operation
- An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes
- Network Security
- Identity-Based Access Control for Ad Hoc Groups
- Mobile Mixing
- A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems
- ADWICE – Anomaly Detection with Real-Time Incremental Clustering
- Steganography
- Steganography for Executables and Code Transformation Signatures
- On Security Notions for Steganalysis
- A Block Oriented Fingerprinting Scheme in Relational Database
- Biometrics
- A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis
- Profile-Based 3D Face Registration and Recognition.