Information Security and Cryptology — ICISC 2002

5th International Conference Seoul, Korea, November 28–29, 2002 Revised Papers

  • Pil Joong Lee
  • Chae Hoon Lim
Conference proceedings ICISC 2002

DOI: 10.1007/3-540-36552-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2587)

Table of contents (36 papers)

  1. Front Matter
    Pages I-XI
  2. Invited Talk

    1. Serge Lefranc, David Naccache
      Pages 1-15
  3. Digital Signatures

    1. Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim
      Pages 16-34
    2. Jun-Bum Shin, Kwangsu Lee, Kyungah Shim
      Pages 35-47
    3. Yuh-Dauh Lyuu, Ming-Luen Wu
      Pages 48-61
    4. Willy Susilo, Rei Safavi-Naini
      Pages 62-74
  4. Internet Security

    1. Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han
      Pages 107-117
    2. Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen
      Pages 118-137
  5. Block/Stream Ciphers

  6. Stream Ciphers & Other Primitives

    1. Se Ah Choi, Kyeongcheol Yang
      Pages 213-226
    2. Tetsu Iwata, Kaoru Kurosawa
      Pages 226-237
    3. Keith M. Martin, Josef Pieprzyk, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild
      Pages 237-252
    4. Josef Pieprzyk, Xian-Mo Zhang
      Pages 253-263
  7. Efficient Implementations

    1. Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park
      Pages 264-282

About these proceedings

Introduction

 This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.

The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.

Keywords

Hardware Information Signatur Smart Card algorithms cryptanalysis cryptographic attacks cryptographic primitives cryptology data encryption data security digital signature systems information security network security security

Editors and affiliations

  • Pil Joong Lee
    • 1
  • Chae Hoon Lim
    • 2
  1. 1.Pohnag University of Science and TechnologyKyungbukKorea
  2. 2.Sejong UniversitySeoulKorea

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-00716-6
  • Online ISBN 978-3-540-36552-5
  • Series Print ISSN 0302-9743