ICISC 2003, Volume 6

Front Cover
Springer Science & Business Media, Mar 31, 2004 - Business & Economics - 458 pages

This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Constructions and Applications
1
A Separable Threshold Ring Signature Scheme
12
On the Security of a Group Signature Scheme with Forward Security
27
An Efficient Strong Designated Verifier Signature Scheme
40
Sound Computational Interpretation of Formal Encryption with Composed Keys
55
On the Security of a New Variant of OMAC
67
New Methods to Construct Cheating Immune Functions
79
Yet Another Definition of Weak Collision Resistance and Its Analysis
87
Providing ReceiptFreeness in MixnetBased Voting Protocols
245
ReceiptFree Electronic Auction Schemes Using Homomorphic Encryption
259
Implementation Analysis and Attacks
274
Analysis of the Bounds for Linear Block Codes in Watermark Channel
294
Security Analysis of Some Proxy Signatures
305
A More Secure and Efficacious TTS Signature Scheme
320
An Efficient Revocation Algorithm in Group Signatures
339
Efficient Forward and Provably Secure IDBased Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
352

Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2
97
A General Expansion Method Using Efficient Endomorphisms
112
Design of Bit Parallel Multiplier with Lower Time Complexity
127
Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some SideChannel Attacks
139
Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion
152
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks
166
Extended Role Based Access Control and Procedural Restrictions
184
LayerBased Access Control Model in the Manufacturing Infrastructure and Design Automation System
197
Secure Double Auction Protocols with Full Privacy Protection
215
SealedBid Auctions with Efficient Bids
230
Group Oriented Cryptosystems Based on Linear Access Structures
370
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters
377
Noninteractive Deniable Ring Authentication
386
Differential Cryptanalysis of TEA and XTEA
402
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher
418
ARIA
432
Truncated Differential Attacks on 8Round CRYPTON
446
Author Index
457
Copyright

Other editions - View all

Common terms and phrases