Advertisement

Information Security and Cryptology – ICISC 2006

9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings

  • Min Surp Rhee
  • Byoungcheon Lee
Conference proceedings ICISC 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4296)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Hash Functions – I

    1. Florian Mendel, Norbert Pramstaller, Christian Rechberger
      Pages 8-21
    2. Vladimir Shpilrain
      Pages 22-28
    3. Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota
      Pages 29-40
  4. Block and Stream Ciphers

    1. Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong
      Pages 41-50
    2. Xian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng
      Pages 65-80
  5. Efficient Implementation and Hardware

    1. Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee
      Pages 81-93
    2. Hidehiro Katou, Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa
      Pages 94-106
    3. Sangwoon Yang, Jinsub Park, Younggap You
      Pages 107-117
    4. Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt
      Pages 118-135
  6. Network Security and Access Control

    1. Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen
      Pages 136-154
    2. Junsheng Chang, Huaimin Wang, Gang Yin
      Pages 155-165
    3. Hong Zhang, Yeping He, Zhiguo Shi
      Pages 166-178
  7. Mobile Communications Security

    1. Jongoh Choi, Si-Ho Cha, JooSeok Song
      Pages 179-193
    2. Divyan M. Konidala, Kwangjo Kim
      Pages 194-205
  8. Forensics

    1. Yoon-Ho Choi, Jong-Ho Park, Sang-Kon Kim, Seung-Woo Seo, Yu Kang, Jin-Gi Choe et al.
      Pages 206-221
  9. Copyright Protection

    1. Chen-Yin Liao, Jen-Wei Yeh, Ming-Seng Kao
      Pages 222-232
    2. Heeyoul Kim, Younho Lee, Byungchun Chung, Hyunsoo Yoon, Jaewon Lee, KyungIm Jung
      Pages 233-245
  10. Biometrics

    1. Kang Ryoung Park, Min Cheol Whang, Joa Sang Lim, Yongjoo Cho
      Pages 246-256
  11. Hash Functions – II

    1. Frédéric Muller, Thomas Peyrin
      Pages 267-285
    2. Hong-Su Cho, Sangwoo Park, Soo Hak Sung, Aaram Yun
      Pages 286-295
  12. Public Key Cryptosystems

    1. Kun Peng, Juan Manuel Nieto, Yvo Desmedt, Ed Dawson
      Pages 296-309
    2. Sanjit Chatterjee, Palash Sarkar
      Pages 310-327
  13. Digital Signatures

    1. Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon
      Pages 328-342
    2. Marek Klonowski, Anna Lauks
      Pages 343-355
  14. Back Matter

About these proceedings

Keywords

RSA Radio-Frequency Identification (RFID) Routing authentication biometrics block ciphers collision communication cryptanalysis cryptographic algorithms cryptographic attacks cryptographic primitives cryptography cryptology privacy

Editors and affiliations

  • Min Surp Rhee
    • 1
  • Byoungcheon Lee
    • 2
  1. 1.Dankook UniversityChungnamKorea
  2. 2.Department of Information SecurityJoongbu UniversityChungnamKorea

Bibliographic information

  • DOI https://doi.org/10.1007/11927587
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-49112-5
  • Online ISBN 978-3-540-49114-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site