Information Security and Cryptology - ICISC 2007

10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings

  • Editors
  • Kil-Hyun Nam
  • Gwangsoo Rhee
Conference proceedings ICISC 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4817)

Table of contents

  1. Front Matter
  2. Cryptanalysis – I

  3. Cryptanalysis – II

    1. Baudoin Collard, F. -X. Standaert, Jean-Jacques Quisquater
      Pages 77-88
    2. Alexander Maximov
      Pages 89-101
    3. Basel Alomair, Loukas Lazos, Radha Poovendran
      Pages 102-115
    4. Chuan-Wen Loe, Khoongming Khoo
      Pages 116-130
    5. System Security

    6. Biometrics

      1. Changlong Jin, Hakil Kim, Stephen Elliott
        Pages 168-179
    7. Cryptographic Protocols

      1. Palash Sarkar
        Pages 180-192
  4. Hash Functions – I

    1. Somitra Kumar Sanadhya, Palash Sarkar
      Pages 193-205
    2. Block and Stream Ciphers

      1. Wentao Zhang, Wenling Wu, Dengguo Feng
        Pages 239-250

About these proceedings

Keywords

Code Information Radio-Frequency Identification (RFID) Ubiquitous Computing algorithms authentication complexity cryptographic algorithhms cryptographic protocols cryptography cryptology data encryption data security digital right security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-76788-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-76787-9
  • Online ISBN 978-3-540-76788-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book