Information Security and Cryptology - ICISC 2001: 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings
Springer, Apr 8, 2002 - Computer security - 457 pages
This book constitutes the refereed proceedings of the 4th International Conference on Security and Cryptology, ICISC 2001, held in Seoul, Korea, in December 2001. The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 107 submissions. All current issues of cryptography and cryptanalysis and their applications to securing data, systems, and communications are addressed.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Practical Security in PublicKey Cryptography
A New Cryptanalytic Method Using the Distribution Characteristics
Truncated Differential Cryptanalysis of Camellia
22 other sections not shown
Other editions - View all
Information Security and Cryptology - ICISC 2000: Third International ...
No preview available - 2001
Information Security and Cryptology - ICISC 2003: 6th International ...
Jong In Lim,Dong Hoon Lee
No preview available - 2004
Advances in Cryptology adversary algorithm Alice application authentication authorisation blind signature block cipher buffer overflow byte CanProve ciphertext Computer Science concrete security cookie cryptanalysis cryptographic Cryptology decryption defined denotes detection digital signature distributed DPA attacks efficient elliptic curve encryption scheme event fault hardware hash function host implementation IND-CCA2 input integer itinerary KCDSA key pair Korea Lemma linear LNCS masking method mobile agent mod q multi-signature scheme multiple NICE cryptosystem node output parameter plaintext players private key probabilistic probability problem Proof proposed protocol provably secure public key queries random bits random oracle model Rijndael round key RSA-OAEP satisfies the strengthened Sbox secret key secret sharing sequence server side channel attacks signature scheme signcryption signers slide attack smartcards Springer-Verlag stack strengthened propagation submessages Theorem vector verifier watermark