Skip to main content
  • Conference proceedings
  • © 2006

Information Security and Cryptology – ICISC 2006

9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4296)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2006.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (28 papers)

  1. Front Matter

  2. Invited Talks

    1. Generic Attacks on Symmetric Ciphers

      • Palash Sarkar
      Pages 7-7
  3. Hash Functions – I

    1. Improved Collision Attack on the Hash Function Proposed at PKC’98

      • Florian Mendel, Norbert Pramstaller, Christian Rechberger
      Pages 8-21
    2. Hashing with Polynomials

      • Vladimir Shpilrain
      Pages 22-28
    3. Birthday Paradox for Multi-collisions

      • Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota
      Pages 29-40
  4. Block and Stream Ciphers

    1. New Variant of the Self-Shrinking Generator and Its Cryptographic Properties

      • Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong
      Pages 41-50
    2. On Algebraic Immunity and Annihilators

      • Xian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng
      Pages 65-80
  5. Efficient Implementation and Hardware

    1. High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem

      • Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee
      Pages 81-93
    2. A High-Speed Square Root Algorithm in Extension Fields

      • Hidehiro Katou, Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa
      Pages 94-106
    3. The Smallest ARIA Module with 16-Bit Architecture

      • Sangwoon Yang, Jinsub Park, Younggap You
      Pages 107-117
    4. A Simpler Sieving Device: Combining ECM and TWIRL

      • Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt
      Pages 118-135
  6. Network Security and Access Control

    1. Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks

      • Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen
      Pages 136-154
    2. A Time-Frame Based Trust Model for P2P Systems

      • Junsheng Chang, Huaimin Wang, Gang Yin
      Pages 155-165
    3. Spatial Context in Role-Based Access Control

      • Hong Zhang, Yeping He, Zhiguo Shi
      Pages 166-178
  7. Mobile Communications Security

    1. An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks

      • Jongoh Choi, Si-Ho Cha, JooSeok Song
      Pages 179-193
    2. Mobile RFID Applications and Security Challenges

      • Divyan M. Konidala, Kwangjo Kim
      Pages 194-205
  8. Forensics

    1. An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time

      • Yoon-Ho Choi, Jong-Ho Park, Sang-Kon Kim, Seung-Woo Seo, Yu Kang, Jin-Gi Choe et al.
      Pages 206-221
  9. Copyright Protection

    1. A Copy Protection Technique Using Multi-level Error Coding

      • Chen-Yin Liao, Jen-Wei Yeh, Ming-Seng Kao
      Pages 222-232

Other Volumes

  1. Information Security and Cryptology – ICISC 2006

Keywords

  • RSA
  • Radio-Frequency Identification (RFID)
  • Routing
  • authentication
  • biometrics
  • block ciphers
  • collision
  • communication
  • cryptanalysis
  • cryptographic algorithms
  • cryptographic attacks
  • cryptographic primitives
  • cryptography
  • cryptology
  • privacy
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Dankook University, Chungnam, Korea

    Min Surp Rhee

  • Department of Information Security, Joongbu University, Chungnam, Korea

    Byoungcheon Lee

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions