default search action
7. ICISC 2004: Seoul, Korea
- Choonsik Park, Seongtaek Chee:
Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3506, Springer 2005, ISBN 3-540-26226-1
Invited Talks
- Michael K. Reiter:
Security by, and for, Converged Mobile Devices. 1 - Frank Stajano:
Security for Ubiquitous Computing. 2
Block Cipher and Stream Cipher
- Nicolas T. Courtois:
Algebraic Attacks on Combiners with Memory and Several Outputs. 3-20 - Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim:
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. 21-32 - Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon-Jae Lee, Sang-Jae Moon:
Dragon: A Fast Word Based Stream Cipher. 33-50
Public Key Cryptosystem
- Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
An Efficient and Verifiable Solution to the Millionaire Problem. 51-66 - Bo-Yin Yang, Jiun-Ming Chen:
All in the XL Family: Theory and Practice. 67-86 - Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim:
Efficient Broadcast Encryption Using Multiple Interpolation Methods. 87-103 - Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen:
On Private Scalar Product Computation for Privacy-Preserving Data Mining. 104-120
PKI and Related Implementation
- Dae Hyun Yum, Pil Joong Lee:
Separable Implicit Certificate Revocation. 121-136 - Bodo Möller:
Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. 137-153 - Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha:
Improvement on Ha-Moon Randomized Exponentiation Algorithm. 154-167 - Sanjit Chatterjee, Palash Sarkar, Rana Barua:
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields. 168-181
Digital Signature
- Jens-Matthias Bohli, Rainer Steinwandt:
On Subliminal Channels in Deterministic Signature Schemes. 182-194 - Seungjoo Kim, Dongho Won:
Threshold Entrusted Undeniable Signature. 195-203 - Joseph K. Liu, Duncan S. Wong:
On the Security Models of (Threshold) Ring Signature Schemes. 204-217 - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Threshold Ring Signature. 218-232 - HyoJin Yoon, Jung Hee Cheon, Yongdae Kim:
Batch Verifications with ID-Based Signatures. 233-248
Elliptic Curve Cryptosystem
- Yasuyuki Nogami, Yoshitaka Morikawa:
A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method. 249-260 - Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis:
Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations. 261-278 - Katsuyuki Takashima:
New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method. 279-295 - Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi:
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. 296-312
Provable Security and Primitives
- Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee:
On the Pseudorandomness of a Modification of KASUMI Type Permutations. 313-329 - Shoichi Hirose:
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. 330-342 - Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong:
Padding Oracle Attacks on Multiple Modes of Operation. 343-351 - Hua Chen, Dengguo Feng:
An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. 352-361
Network Security
- Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Identity-Based Access Control for Ad Hoc Groups. 362-379 - Marcin Gogolewski, Miroslaw Kutylowski, Tomasz Luczak:
Mobile Mixing. 380-393 - Minsoo Lee, Jintaek Kim, Sehyun Park, Ohyoung Song, Sungik Jun:
A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems. 394-406 - Kalle Burbeck, Simin Nadjm-Tehrani:
ADWICE - Anomaly Detection with Real-Time Incremental Clustering. 407-424
Steganography
- Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere:
Steganography for Executables and Code Transformation Signatures. 425-439 - Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim:
On Security Notions for Steganalysis. 440-454 - Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao:
A Block Oriented Fingerprinting Scheme in Relational Database. 455-466
Biometrics
- Youngchan Han, Choonwoo Ryu, Jihyun Moon, Hakil Kim, H. Choi:
A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis. 467-477 - Chao Li, Armando Barreto:
Profile-Based 3D Face Registration and Recognition. 478-488
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.