Information Security and Cryptology - ICISC 2005

8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers

  • Dong Ho Won
  • Seungjoo Kim
Conference proceedings ICISC 2005

DOI: 10.1007/11734727

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3935)

Table of contents (34 papers)

  1. Front Matter
  2. Invited Talks

  3. Key Management and Distributed Cryptography

    1. A Timed-Release Key Management Scheme for Backward Recovery
      Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara
      Pages 3-14
    2. Property-Based Broadcast Encryption for Multi-level Security Policies
      André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
      Pages 15-31
  4. Authentication and Biometrics

    1. An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image
      Woong-Sik Kim, Weon-Hee Yoo, Jang-Hyun Park, Bok-Ki Kim
      Pages 48-55
    2. Trust Management for Resilient Wireless Sensor Networks
      Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon
      Pages 56-68
    3. Improvements to Mitchell’s Remote User Authentication Protocol
      Vipul Goyal, Abhishek Jain, Jean Jacques Quisquater
      Pages 69-80
    4. Efficient Authenticators with Application to Key Exchange
      Shaoquan Jiang, Guang Gong
      Pages 81-91
  5. Provable Security and Primitives

    1. Benes and Butterfly Schemes Revisited
      Jacques Patarin, Audrey Montreuil
      Pages 92-116
    2. Relative Doubling Attack Against Montgomery Ladder
      Sung-Ming Yen, Lee-Chun Ko, SangJae Moon, JaeCheol Ha
      Pages 117-128
    3. Improved Collision Attack on MD4 with Probability Almost 1
      Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
      Pages 129-145
    4. Finding Collision on 45-Step HAS-160
      Aaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho
      Pages 146-155
  6. System/Network Security

    1. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
      David Molnar, Matt Piotrowski, David Schultz, David Wagner
      Pages 156-168
    2. The Dilemma of Covert Channels Searching
      Changda Wang, Shiguang Ju
      Pages 169-174
    3. A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks
      Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon-Jung Chung, InJung Kim, Doo-Kwon Baik
      Pages 175-185
    4. Foundations of Attack Trees
      Sjouke Mauw, Martijn Oostdijk
      Pages 186-198
  7. Block/Stream Ciphers (I)

    1. An Algebraic Masking Method to Protect AES Against Power Attacks
      Nicolas T. Courtois, Louis Goubin
      Pages 199-209
    2. Characterisations of Extended Resiliency and Extended Immunity of S-Boxes
      Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golić
      Pages 210-228

About these proceedings


authentication biometrics computational number theory cryptanalysis cryptographic algorithms cryptographic attacks cryptographic primitives cryptographic protocols cryptography cryptology cryptosystems data encryption data security digital ri

Editors and affiliations

  • Dong Ho Won
    • 1
  • Seungjoo Kim
    • 2
  1. 1.Information Security GroupSungkyunkwan UniversitySuwonKorea
  2. 2.Information Security GroupSungkyunkwan UniversitySuwon-siKorea

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-33354-8
  • Online ISBN 978-3-540-33355-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349