This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.
The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.
Author(s): Jonathan Katz (auth.), Jong-In Lim, Dong-Hoon Lee (eds.)
Series: Lecture Notes in Computer Science 2971
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004
Language: English
Pages: 464
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems
Front Matter....Pages -
Binary Tree Encryption: Constructions and Applications....Pages 1-11
A Separable Threshold Ring Signature Scheme....Pages 12-26
On the Security of a Group Signature Scheme with Forward Security....Pages 27-39
An Efficient Strong Designated Verifier Signature Scheme....Pages 40-54
Sound Computational Interpretation of Formal Encryption with Composed Keys....Pages 55-66
On the Security of a New Variant of OMAC....Pages 67-78
New Methods to Construct Cheating Immune Functions....Pages 79-86
Yet Another Definition of Weak Collision Resistance and Its Analysis....Pages 87-96
Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2....Pages 97-111
A General Expansion Method Using Efficient Endomorphisms....Pages 112-126
Design of Bit Parallel Multiplier with Lower Time Complexity....Pages 127-138
Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks....Pages 139-151
Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion....Pages 152-165
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks....Pages 166-183
Extended Role Based Access Control and Procedural Restrictions....Pages 184-196
Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System....Pages 197-214
Secure Double Auction Protocols with Full Privacy Protection....Pages 215-229
Sealed-Bid Auctions with Efficient Bids....Pages 230-244
Providing Receipt-Freeness in Mixnet-Based Voting Protocols....Pages 245-258
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption....Pages 259-273
Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks....Pages 274-293
Analysis of the Bounds for Linear Block Codes in Watermark Channel....Pages 294-304
Security Analysis of Some Proxy Signatures....Pages 305-319
A More Secure and Efficacious TTS Signature Scheme....Pages 320-338
An Efficient Revocation Algorithm in Group Signatures....Pages 339-351
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity....Pages 352-369
Group Oriented Cryptosystems Based on Linear Access Structures....Pages 370-376
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters....Pages 377-385
Non-interactive Deniable Ring Authentication....Pages 386-401
Differential Cryptanalysis of TEA and XTEA....Pages 402-417
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher....Pages 418-431
New Block Cipher: ARIA....Pages 432-445
Truncated Differential Attacks on 8-Round CRYPTON....Pages 446-456
Back Matter....Pages -