Information Security and Cryptology – ICISC 2004

7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers

  • Choon-sik Park
  • Seongtaek Chee
Conference proceedings ICISC 2004

DOI: 10.1007/b137120

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3506)

Table of contents (35 papers)

  1. Front Matter
  2. Invited Talks

  3. Block Cipher and Stream Cipher

    1. New Method for Bounding the Maximum Differential Probability for SPNs and ARIA
      Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim
      Pages 21-32
    2. Dragon: A Fast Word Based Stream Cipher
      Kevin Chen, Matt Henricksen, William Millan, Joanne Fuller, Leonie Simpson, Ed Dawson et al.
      Pages 33-50
  4. Public Key Cryptosystem

    1. An Efficient and Verifiable Solution to the Millionaire Problem
      Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
      Pages 51-66
    2. All in the XL Family: Theory and Practice
      Bo-Yin Yang, Jiun-Ming Chen
      Pages 67-86
    3. Efficient Broadcast Encryption Using Multiple Interpolation Methods
      Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim
      Pages 87-103
    4. On Private Scalar Product Computation for Privacy-Preserving Data Mining
      Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen
      Pages 104-120
  5. PKI and Related Implementation

    1. Separable Implicit Certificate Revocation
      Dae Hyun Yum, Pil Joong Lee
      Pages 121-136
    2. Improvement on Ha-Moon Randomized Exponentiation Algorithm
      Sung-Ming Yen, Chien-Ning Chen, SangJae Moon, JaeCheol Ha
      Pages 154-167
  6. Digital Signature

    1. On Subliminal Channels in Deterministic Signature Schemes
      Jens-Matthias Bohli, Rainer Steinwandt
      Pages 182-194
    2. Threshold Entrusted Undeniable Signature
      Seungjoo Kim, Dongho Won
      Pages 195-203
    3. On the Security Models of (Threshold) Ring Signature Schemes
      Joseph K. Liu, Duncan S. Wong
      Pages 204-217
    4. Identity Based Threshold Ring Signature
      Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
      Pages 218-232
    5. Batch Verifications with ID-Based Signatures
      HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
      Pages 233-248
  7. Elliptic Curve Cryptosystem

    1. A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method
      Yasuyuki Nogami, Yoshitaka Morikawa
      Pages 249-260

About these proceedings


Code Information Oracle Windows algorithm algorithms biometric security cryptanalysis cryptography database digital signatures information security internet security mobile security network security

Editors and affiliations

  • Choon-sik Park
    • 1
  • Seongtaek Chee
    • 2
  1. 1.National Security Research InstituteDaejeonKorea
  2. 2.National Security Research Institute (NSRI)DaejeonKorea

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-26226-8
  • Online ISBN 978-3-540-32083-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349