Advertisement

Information Security and Cryptology - ICISC 2005

8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers

  • Dong Ho Won
  • Seungjoo Kim

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3935)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Key Management and Distributed Cryptography

    1. Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara
      Pages 3-14
    2. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
      Pages 15-31
  4. Authentication and Biometrics

    1. Woong-Sik Kim, Weon-Hee Yoo, Jang-Hyun Park, Bok-Ki Kim
      Pages 48-55
    2. Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon
      Pages 56-68
    3. Vipul Goyal, Abhishek Jain, Jean Jacques Quisquater
      Pages 69-80
    4. Shaoquan Jiang, Guang Gong
      Pages 81-91
  5. Provable Security and Primitives

    1. Jacques Patarin, Audrey Montreuil
      Pages 92-116
    2. Sung-Ming Yen, Lee-Chun Ko, SangJae Moon, JaeCheol Ha
      Pages 117-128
    3. Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
      Pages 129-145
    4. Aaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho
      Pages 146-155
  6. System/Network Security

    1. David Molnar, Matt Piotrowski, David Schultz, David Wagner
      Pages 156-168
    2. Changda Wang, Shiguang Ju
      Pages 169-174
    3. Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon-Jung Chung, InJung Kim, Doo-Kwon Baik
      Pages 175-185
    4. Sjouke Mauw, Martijn Oostdijk
      Pages 186-198
  7. Block/Stream Ciphers (I)

    1. Nicolas T. Courtois, Louis Goubin
      Pages 199-209
    2. Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golić
      Pages 210-228
    3. Wenling Wu, Wentao Zhang, Dengguo Feng
      Pages 229-241
    4. Kazuhiko Minematsu, Yukiyasu Tsunoo
      Pages 242-260
  8. Block/Stream Ciphers (II)

    1. Nicolas T. Courtois
      Pages 261-269
    2. Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang
      Pages 270-283
    3. Kazuhiko Minematsu, Yukiyasu Tsunoo
      Pages 284-298
  9. Efficient Implementations

    1. Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez
      Pages 322-334
    2. Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song
      Pages 352-361
  10. Digital Rights Management

  11. Public Key Cryptography

    1. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu
      Pages 389-409
    2. Qianhong Wu, Fanguo Zhang, Willy Susilo, Yi Mu
      Pages 410-423
    3. Duc-Liem Vo, Kwangjo Kim
      Pages 441-455
  12. Back Matter

About these proceedings

Keywords

authentication biometrics computational number theory cryptanalysis cryptographic algorithms cryptographic attacks cryptographic primitives cryptographic protocols cryptography cryptology cryptosystems data encryption data security digital ri

Editors and affiliations

  • Dong Ho Won
    • 1
  • Seungjoo Kim
    • 2
  1. 1.Information Security GroupSungkyunkwan UniversitySuwonKorea
  2. 2.Information Security GroupSungkyunkwan UniversitySuwon-siKorea

Bibliographic information

  • DOI https://doi.org/10.1007/11734727
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-33354-8
  • Online ISBN 978-3-540-33355-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site