Advertisement

Information Security and Cryptology — ICISC 2000

Third International Conference Seoul, Korea, December 8–9, 2000 Proceedings

  • Dongho Won
Conference proceedings ICISC 2000

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2015)

Table of contents

  1. Front Matter
    Pages I-X
  2. Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko
    Pages 14-21
  3. Steve Babbage, Laurent Frisch
    Pages 22-36
  4. Dong Hyeon Cheon, Seok Hie Hong, Sang Jin Lee, Sung Jae Lee, Kyung Hwan Park, Seon Hee Yoon
    Pages 37-48
  5. Yuliang Zheng, Xian-Mo Zhang
    Pages 49-63
  6. Jung Hee Cheon, Seongtaek Chee
    Pages 64-72
  7. Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano
    Pages 90-108
  8. Olivier Markowitch, Steve Kremer
    Pages 109-122
  9. Byoungcheon Lee, Kwangjo Kim
    Pages 123-134
  10. Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee
    Pages 150-161
  11. Yi Mu, Vijay Varadharajan
    Pages 171-182
  12. Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita
    Pages 183-191
  13. DongGook Park, Colin Boyd, Ed Dawson
    Pages 192-205
  14. William D. Banks, Daniel Lieman, Igor E. Shparlinski, Thuong Van To
    Pages 206-220
  15. Back Matter
    Pages 261-261

About these proceedings

Introduction

I would like to welcome all the participants to the 3rd International Conference on Information Security and Cryptology (ICISC 2000). It is sponsored by the Korea Institute of Information Security and Cryptology (KIISC) and is being held at Dongguk University in Seoul, Korea from December 8 to 9, 2000. This conference aims at providing a forum for the presentation of new results in research, development, and application in information security and cryptology. This is also intended to be a place where research information can be exchanged. The Call for Papers brought 56 papers from 15 countries and 20 papers will be presented in ve sessions. As was the case last year the review process was totally blind and the anonymity of each submission was maintained. The 22 TPC members nally selected 20 top-quality papers for presentation at ICISC 2000. I am very grateful to the TPC members who devoted much e ort and time to reading and selecting the papers. We also thank the experts who assisted the TPC in evaluating various papers and apologize for not including their names here. Moreover, I would like to thank all the authors who submitted papers to ICISC 2000 and the authors of accepted papers for their preparation of came- ready manuscripts. Last but not least, I thank my student, Joonsuk Yu, who helped me during the whole process of preparation for the conference. I look forward to your participation and hope you will nd ICISC 2000 a truly rewarding experience.

Keywords

Cryptoanalysis Cryptographic Algorithms Data Encryption Information Security Internet Network Security Secure Communication Wireless communication cryptology data security digital finite field privacy security

Editors and affiliations

  • Dongho Won
    • 1
  1. 1.School of Electronical and Computer EngineeringSungkyunkwan UniversitySuwonKorea

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45247-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-41782-8
  • Online ISBN 978-3-540-45247-8
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site