Information Security and Cryptology — ICISC 2002

5th International Conference Seoul, Korea, November 28–29, 2002 Revised Papers

  • Pil Joong Lee
  • Chae Hoon Lim
Conference proceedings ICISC 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2587)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Invited Talk

    1. Serge Lefranc, David Naccache
      Pages 1-15
  3. Digital Signatures

    1. Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim
      Pages 16-34
    2. Jun-Bum Shin, Kwangsu Lee, Kyungah Shim
      Pages 35-47
    3. Yuh-Dauh Lyuu, Ming-Luen Wu
      Pages 48-61
    4. Willy Susilo, Rei Safavi-Naini
      Pages 62-74
  4. Internet Security

    1. Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han
      Pages 107-117
    2. Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen
      Pages 118-137
  5. Block/Stream Ciphers

  6. Stream Ciphers & Other Primitives

    1. Se Ah Choi, Kyeongcheol Yang
      Pages 213-226
    2. Tetsu Iwata, Kaoru Kurosawa
      Pages 226-237
    3. Keith M. Martin, Josef Pieprzyk, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild
      Pages 237-252
    4. Josef Pieprzyk, Xian-Mo Zhang
      Pages 253-263
  7. Efficient Implementations

    1. Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park
      Pages 264-282
    2. Bodo Möller
      Pages 298-312
    3. Hyun-Gyu Kim, Hyeong-Cheol Oh
      Pages 313-326
  8. Side-Channel Attacks

    1. Régis Bevan, Erik Knudsen
      Pages 327-342
    2. Kouichi Sakurai, Tsuyoshi Takagi
      Pages 359-374
    3. Sung-Ming Yen, Sangjae Moon, Jae-Cheol Ha
      Pages 374-388
  9. Cryptographic Protocols I

    1. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
      Pages 407-420
    2. Hak Soo Ju, Hyun Jeong Kim, Dong Hoon Lee, Jong In Lim
      Pages 421-432
  10. Cryptographic Protocols II

    1. Olivier Markowitch, Dieter Gollmann, Steve Kremer
      Pages 451-465
    2. Jae-il Lee, Taekyoung Kwon, Sanghoon Song, Jooseok Song
      Pages 465-477
    3. Hartono Kurnio, Luk McAven, Rei Safavi-Naini, Huaxiong Wang
      Pages 478-496
    4. Ju Hee Ki, Hyun Jeong Kim, Dong Hoon Lee, Chang Seop Park
      Pages 497-509
  11. Biometrics

    1. Younhee Gil, Daesung Moon, Sungbum Pan, Yongwha Chung
      Pages 510-524
  12. Back Matter
    Pages 535-536

About these proceedings


 This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.

The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.


Hardware Information Signatur Smart Card algorithms cryptanalysis cryptographic attacks cryptographic primitives cryptology data encryption data security digital signature systems information security network security security

Editors and affiliations

  • Pil Joong Lee
    • 1
  • Chae Hoon Lim
    • 2
  1. 1.Pohnag University of Science and TechnologyKyungbukKorea
  2. 2.Sejong UniversitySeoulKorea

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-00716-6
  • Online ISBN 978-3-540-36552-5
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site