Information Security and Cryptology - ICISC 2005

8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers

  • Dong Ho Won
  • Seungjoo Kim

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3935)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Key Management and Distributed Cryptography

    1. Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara
      Pages 3-14
    2. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
      Pages 15-31
  4. Authentication and Biometrics

    1. Woong-Sik Kim, Weon-Hee Yoo, Jang-Hyun Park, Bok-Ki Kim
      Pages 48-55
    2. Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon
      Pages 56-68
    3. Vipul Goyal, Abhishek Jain, Jean Jacques Quisquater
      Pages 69-80
    4. Shaoquan Jiang, Guang Gong
      Pages 81-91
  5. Provable Security and Primitives

    1. Jacques Patarin, Audrey Montreuil
      Pages 92-116
    2. Sung-Ming Yen, Lee-Chun Ko, SangJae Moon, JaeCheol Ha
      Pages 117-128
    3. Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
      Pages 129-145
    4. Aaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho
      Pages 146-155
  6. System/Network Security

    1. David Molnar, Matt Piotrowski, David Schultz, David Wagner
      Pages 156-168
    2. Changda Wang, Shiguang Ju
      Pages 169-174
    3. Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon-Jung Chung, InJung Kim, Doo-Kwon Baik
      Pages 175-185
    4. Sjouke Mauw, Martijn Oostdijk
      Pages 186-198
  7. Block/Stream Ciphers (I)

    1. Nicolas T. Courtois, Louis Goubin
      Pages 199-209
    2. Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golić
      Pages 210-228

About these proceedings

Keywords

authentication biometrics computational number theory cryptanalysis cryptographic algorithms cryptographic attacks cryptographic primitives cryptographic protocols cryptography cryptology cryptosystems data encryption data security digital ri

Editors and affiliations

  • Dong Ho Won
    • 1
  • Seungjoo Kim
    • 2
  1. 1.Information Security GroupSungkyunkwan UniversitySuwonKorea
  2. 2.Information Security GroupSungkyunkwan UniversitySuwon-siKorea

Bibliographic information

  • DOI https://doi.org/10.1007/11734727
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-33354-8
  • Online ISBN 978-3-540-33355-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book