© 2001

Information and Communications Security

Third International Conference, ICICS 2001 Xian, China, November 13–16, 2001 Proceedings

  • Sihan Qing
  • Tatsuaki Okamoto
  • Jianying Zhou
Conference proceedings ICICS 2001

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2229)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Dongxi Liu, Xiaoyong Li, Yingcai Bai
    Pages 13-22
  3. Kishan Chand Gupta, Subhamoy Maitra
    Pages 23-34
  4. Bo Yang, Shixiong Zhu, Yumin Wang
    Pages 35-41
  5. Chin-Chen Chang, Iuon-Chang Lin
    Pages 42-46
  6. Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi
    Pages 62-73
  7. Fangguo Zhang, Futai Zhang, Yumin Wang
    Pages 74-83
  8. Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou
    Pages 84-89
  9. Hee-Wan Kim, Hae-Kyung Rhee, Tai M. Chung, Young Ik Eom, Ung-Mo Kim
    Pages 107-118
  10. Sungbaek Cho, Zbigniew Ciechanowicz
    Pages 119-130
  11. Michael Hitchens, Vijay Varadharajan
    Pages 131-143
  12. Xian-Mo Zhang, Josef Pieprzyk
    Pages 144-149
  13. Gideon Samid
    Pages 150-154
  14. Zhimin Song, Sihan Qing
    Pages 155-166
  15. Ian Herwono, Ingo Liebhardt
    Pages 167-171

About these proceedings


ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi’an, China, 13-16 November 2001. Among the preceding conferences, ICICS’97 was held in Beijing, China, 11-14 November 1997 and ICICS’99 in Sydney, Australia, 9-11 November 1999. The ICICS’97 and ICICS’99 proceedings were released as volumes 1334 and 1726 of Springer- Verlag’s Lecture Notes in Computer Science series. ICICS 2001 was sponsored by the Chinese Academy of Sciences (CAS), the - tional Natural Science Foundation of China, and the China Computer Fe- ration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Association for Cryptologic Re- arch (IACR), the International Communications and Information Security - sociation (ICISA), and the Asiacrypt Steering Committee. The format of ICICS 2001 was selected to cover the complete spectrum of - formation and communications security, and to promote participant interaction. The sessions were designed to promote interaction between the major topics of the conference: theoretical foundations of security, secret sharing, network - curity, authentication and identi?cation, boolean functions and stream ciphers, security evaluation, signatures, block ciphers and public-key systems, infor- tion hiding, protocols and their analysis, and cryptanalysis. The 29-member Program Committee considered 134 submissions from 23 di- rent countries and regions, among them 56 papers were accepted for presentation.


Authentication Boolean function Code Computational Algebra Cryptographic Algorithms Data Security Digital Communication Digital Signature Schemes Error-correcting Code Information Information Security Internet Security Routing communication finite field

Editors and affiliations

  • Sihan Qing
    • 1
  • Tatsuaki Okamoto
    • 2
  • Jianying Zhou
    • 3
  1. 1.Engineering Research Center for Information Security Technology (ERCIST)Chinese Academy of SciencesBeijingChina
  2. 2.NTT LabsYokosuka-shiJapan
  3. 3.Oracle CorporationRedwood ShoresUSA

Bibliographic information