ICISC 2003, Volume 6

Front Cover
Jong In Lim, Dong Hoon Lee
Springer Science & Business Media, Mar 31, 2004 - Business & Economics - 458 pages

This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.

 

Contents

Invited Talk
1
On the Security of a Group Signature Scheme with Forward Security
27
An Efficient Strong Designated Verifier Signature Scheme
40
Table of Contents
49
Primitives
55
New Methods to Construct Cheating Immune Functions
79
Fast Implementations
97
A General Expansion Method Using Efficient Endomorphisms
112
ReceiptFree Electronic Auction Schemes Using Homomorphic Encryption
259
Watermarking
274
Analysis of the Bounds for Linear Block Codes in Watermark Channel
294
Security Analysis of Some Proxy Signatures
305
A More Secure and Efficacious TTS Signature Scheme
320
JiunMing Chen and BoYin Yang
328
An Efficient Revocation Algorithm in Group Signatures
339
Efficient Forward and Provably Secure IDBased Signcryption Scheme
352

Design of Bit Parallel Multiplier with Lower Time Complexity
127
Architecture for an Elliptic Curve Scalar Multiplication Resistant
139
Efficient Scalar Multiplication in Hyperelliptic Curves
152
Computer SecurityMobile Security
166
Extended Role Based Access Control and Procedural Restrictions
184
LayerBased Access Control Model in the Manufacturing Infrastructure
197
VotingAuction Protocols
215
SealedBid Auctions with Efficient Bids
230
Providing ReceiptFreeness in MixnetBased Voting Protocols
245
AuthenticationThreshold Protocols
370
A New Algorithm for Searching a Consistent Set of Shares
377
Noninteractive Deniable Ring Authentication
386
BlockStream Ciphers
402
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher
418
ARIA
432
Truncated Differential Attacks on 8Round CRYPTON
446
Author Index
457
Copyright

Other editions - View all

Common terms and phrases