default search action
9. ICISC 2006: Busan, Korea
- Min Surp Rhee, Byoungcheon Lee:
Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings. Lecture Notes in Computer Science 4296, Springer 2006, ISBN 3-540-49112-0
Invited Talks
- Serge Vaudenay:
RFID Privacy Based on Public-Key Cryptography. 1-6 - Palash Sarkar:
Generic Attacks on Symmetric Ciphers. 7
Hash Functions - I
- Florian Mendel, Norbert Pramstaller, Christian Rechberger:
Improved Collision Attack on the Hash Function Proposed at PKC'98. 8-21 - Vladimir Shpilrain:
Hashing with Polynomials. 22-28 - Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota:
Birthday Paradox for Multi-collisions. 29-40
Block and Stream Ciphers
- Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong:
New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. 41-50 - Bonwook Koo, Hwan Seok Jang, Jung Hwan Song:
On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. 51-64 - Xian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng:
On Algebraic Immunity and Annihilators. 65-80
Efficient Implementation and Hardware
- Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee:
High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. 81-93 - Hidehiro Katou, Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa:
A High-Speed Square Root Algorithm in Extension Fields. 94-106 - Sangwoon Yang, Jinsub Park, Younggap You:
The Smallest ARIA Module with 16-Bit Architecture. 107-117 - Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt:
A Simpler Sieving Device: Combining ECM and TWIRL. 118-135
Network Security and Access Control
- Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen:
Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. 136-154 - Junsheng Chang, Huaimin Wang, Gang Yin:
A Time-Frame Based Trust Model for P2P Systems. 155-165 - Hong Zhang, Yeping He, Zhiguo Shi:
Spatial Context in Role-Based Access Control. 166-178
Mobile Communications Security
- Jongoh Choi, Si-Ho Cha, JooSeok Song:
An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks. 179-193 - Divyan M. Konidala, Kwangjo Kim:
Mobile RFID Applications and Security Challenges. 194-205
Forensics
- Yoon-Ho Choi, Jong-Ho Park, Sang-Kon Kim, Seung-Woo Seo, Yu Kang, Jin Gi Choe, Ho-Kun Moon, Myung-Soo Rhee:
An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time. 206-221
Copyright Protection
- Chen-Yin Liao, Jen-Wei Yeh, Ming-Seng Kao:
A Copy Protection Technique Using Multi-level Error Coding. 222-232 - Heeyoul Kim, Younho Lee, Byungchun Chung, Hyunsoo Yoon, Jaewon Lee, KyungIm Jung:
Digital Rights Management with Right Delegation for Home Networks. 233-245
Biometrics
- Kang Ryoung Park, Min Cheol Whang, Joa Sang Lim, Yongjoo Cho:
Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM. 246-256
Hash Functions - II
- Daniel Joscák, Jirí Tuma:
Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. 257-266 - Frédéric Muller, Thomas Peyrin:
Cryptanalysis of T-Function-Based Hash Functions. 267-285 - Hong-Su Cho, Sangwoo Park, Soo Hak Sung, Aaram Yun:
Collision Search Attack for 53-Step HAS-160. 286-295
Public Key Cryptosystems
- Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson:
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. 296-309 - Sanjit Chatterjee, Palash Sarkar:
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle. 310-327
Digital Signatures
- Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon:
A New Proxy Signature Scheme Providing Self-delegation. 328-342 - Marek Klonowski, Anna Lauks:
Extended Sanitizable Signatures. 343-355
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.