Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Rhee, Min Surp (Επιμελητής έκδοσης), Lee, Byoungcheon (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4296
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talks
  • RFID Privacy Based on Public-Key Cryptography
  • Generic Attacks on Symmetric Ciphers
  • Hash Functions – I
  • Improved Collision Attack on the Hash Function Proposed at PKC’98
  • Hashing with Polynomials
  • Birthday Paradox for Multi-collisions
  • Block and Stream Ciphers
  • New Variant of the Self-Shrinking Generator and Its Cryptographic Properties
  • On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher
  • On Algebraic Immunity and Annihilators
  • Efficient Implementation and Hardware
  • High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem
  • A High-Speed Square Root Algorithm in Extension Fields
  • The Smallest ARIA Module with 16-Bit Architecture
  • A Simpler Sieving Device: Combining ECM and TWIRL
  • Network Security and Access Control
  • Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks
  • A Time-Frame Based Trust Model for P2P Systems
  • Spatial Context in Role-Based Access Control
  • Mobile Communications Security
  • An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks
  • Mobile RFID Applications and Security Challenges
  • Forensics
  • An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time
  • Copyright Protection
  • A Copy Protection Technique Using Multi-level Error Coding
  • Digital Rights Management with Right Delegation for Home Networks
  • Biometrics
  • Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM
  • Hash Functions – II
  • Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction
  • Cryptanalysis of T-Function-Based Hash Functions
  • Collision Search Attack for 53-Step HAS-160
  • Public Key Cryptosystems
  • Klein Bottle Routing: An Alternative to Onion Routing and Mix Network
  • New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
  • Digital Signatures
  • A New Proxy Signature Scheme Providing Self-delegation
  • Extended Sanitizable Signatures.