Skip to main content
  • Conference proceedings
  • © 2006

Information Security and Cryptology - ICISC 2005

8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3935)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (34 papers)

  1. Front Matter

  2. Key Management and Distributed Cryptography

    1. A Timed-Release Key Management Scheme for Backward Recovery

      • Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara
      Pages 3-14
    2. Property-Based Broadcast Encryption for Multi-level Security Policies

      • André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
      Pages 15-31
  3. Authentication and Biometrics

    1. An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image

      • Woong-Sik Kim, Weon-Hee Yoo, Jang-Hyun Park, Bok-Ki Kim
      Pages 48-55
    2. Trust Management for Resilient Wireless Sensor Networks

      • Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon
      Pages 56-68
    3. Improvements to Mitchell’s Remote User Authentication Protocol

      • Vipul Goyal, Abhishek Jain, Jean Jacques Quisquater
      Pages 69-80
    4. Efficient Authenticators with Application to Key Exchange

      • Shaoquan Jiang, Guang Gong
      Pages 81-91
  4. Provable Security and Primitives

    1. Benes and Butterfly Schemes Revisited

      • Jacques Patarin, Audrey Montreuil
      Pages 92-116
    2. Relative Doubling Attack Against Montgomery Ladder

      • Sung-Ming Yen, Lee-Chun Ko, SangJae Moon, JaeCheol Ha
      Pages 117-128
    3. Improved Collision Attack on MD4 with Probability Almost 1

      • Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
      Pages 129-145
    4. Finding Collision on 45-Step HAS-160

      • Aaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho
      Pages 146-155
  5. System/Network Security

    1. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks

      • David Molnar, Matt Piotrowski, David Schultz, David Wagner
      Pages 156-168
    2. The Dilemma of Covert Channels Searching

      • Changda Wang, Shiguang Ju
      Pages 169-174
    3. A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks

      • Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon-Jung Chung, InJung Kim, Doo-Kwon Baik
      Pages 175-185
    4. Foundations of Attack Trees

      • Sjouke Mauw, Martijn Oostdijk
      Pages 186-198
  6. Block/Stream Ciphers (I)

    1. An Algebraic Masking Method to Protect AES Against Power Attacks

      • Nicolas T. Courtois, Louis Goubin
      Pages 199-209
    2. Characterisations of Extended Resiliency and Extended Immunity of S-Boxes

      • Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golić
      Pages 210-228

Other Volumes

  1. Information Security and Cryptology - ICISC 2005

Editors and Affiliations

  • Information Security Group, Sungkyunkwan University, Suwon, Korea

    Dong Ho Won

  • Information Security Group, Sungkyunkwan University, Suwon-si, Korea

    Seungjoo Kim

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access