Information Security and Cryptology - ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers

Front Cover
Springer Science & Business Media, 2005 - Business & Economics - 490 pages
The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and was sponsored by the Ministry of Information and Communi- tion of Korea. The conference received 194 submissions, and the Program Committee - lected 34 of these for presentation. The conference program included two invited lectures.MikeReiterspokeon“Securityby,andfor,ConvergedMobileDevices.” And Frank Stajano spoke on “Security for Ubiquitous Computing.” We would like to ?rst thank the many researchers from all over the world who subm- ted their work to this conference. An electronic submission process was ava- able. The submission review process had two phases. In the ?rst phase, Program Committeememberscompiledreports(assistedattheirdiscretionbysubreferees of their choice, but without interaction with other Program Committee m- bers) and entered them, via a Web interface, into the Web Review software. We would like to thank the developers, Bart Preneel, Wim Moreau, and Joris Claessens. Without the Web Review system, the whole review process would not have been possible. In the second phase, Program Committee members used the software to browse each other's reports, and discuss and update their own reports.WeareextremelygratefultotheProgramCommittee membersfortheir enormous investment of time, e?ort, and adrenaline in the di?cult and delicate process of review and selection.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Security by and for Converged Mobile Devices
1
Security for Ubiquitous Computing
2
Algebraic Attacks on Combiners with Memory and Several Outputs
3
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA
21
A Fast Word Based Stream Cipher
33
An Efficient and Verifiable Solution to the Millionaire Problem
51
Theory and Practice
67
Efficient Broadcast Encryption Using Multiple Interpolation Methods
87
Difficulties and Efficiency Considerations
261
New Families of Hyperelliptic Curves with Efficient GallantLambertVanstone Method
279
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors
296
On the Pseudorandomness of a Modification of KASUMI Type Permutations
313
Provably Secure DoubleBlockLength Hash Functions in a BlackBox Model
330
Padding Oracle Attacks on Multiple Modes of Operation
343
An Evolutionary Algorithm to Improve the Nonlinearity of Selfinverse SBoxes
352
IdentityBased Access Control for Ad Hoc Groups
362

On Private Scalar Product Computation for PrivacyPreserving Data Mining
104
Separable Implicit Certificate Revocation
121
Improved SignedDigit Representations for Efficient Exponentiation
137
Improvement on HaMoon Randomized Exponentiation Algorithm
154
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields
168
On Subliminal Channels in Deterministic Signature Schemes
182
Threshold Entrusted Undeniable Signature
195
On the Security Models of Threshold Ring Signature Schemes
204
Identity Based Threshold Ring Signature
218
Batch Verifications with IDBased Signatures
233
A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method
249
Mobile Mixing
380
A LocationAware Secure Interworking Architecture Between 3GPP and WLAN Systems
394
ADWICE Anomaly Detection with RealTime Incremental Clustering
407
Steganography for Executables and Code Transformation Signatures
425
On Security Notions for Steganalysis Extended Abstract
440
A Block Oriented Fingerprinting Scheme in Relational Database
455
A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis
467
ProfileBased 3D Face Registration and Recognition
478
Author Index
489
Copyright

Other editions - View all

Common terms and phrases