Information Security and Cryptology - ICISC 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 2005, held in Seoul, Korea in December 2005.

The 32 revised full papers presented together with two invited talks have gone through two rounds of reviewing and improvement and were selected from 192 submissions. The papers are organized in topical sections on key management and distributed cryptography, authentication and biometrics, provable security and primitives, system and network security, block ciphers and stream ciphers, efficient implementations, digital rights management, and public key cryptography.

Author(s): David Naccache (auth.), Dong Ho Won, Seungjoo Kim (eds.)
Series: Lecture Notes in Computer Science 3935
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 458
Tags: Data Encryption; Discrete Mathematics in Computer Science; Operating Systems; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks

Front Matter....Pages -
National Security, Forensics and Mobile Communications....Pages 1-1
Information Security as Interdisciplinary Science Based on Ethics....Pages 2-2
A Timed-Release Key Management Scheme for Backward Recovery....Pages 3-14
Property-Based Broadcast Encryption for Multi-level Security Policies....Pages 15-31
Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption....Pages 32-47
An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image....Pages 48-55
Trust Management for Resilient Wireless Sensor Networks....Pages 56-68
Improvements to Mitchell’s Remote User Authentication Protocol....Pages 69-80
Efficient Authenticators with Application to Key Exchange....Pages 81-91
Benes and Butterfly Schemes Revisited....Pages 92-116
Relative Doubling Attack Against Montgomery Ladder....Pages 117-128
Improved Collision Attack on MD4 with Probability Almost 1....Pages 129-145
Finding Collision on 45-Step HAS-160....Pages 146-155
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks....Pages 156-168
The Dilemma of Covert Channels Searching....Pages 169-174
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks....Pages 175-185
Foundations of Attack Trees....Pages 186-198
An Algebraic Masking Method to Protect AES Against Power Attacks....Pages 199-209
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes....Pages 210-228
Integral Cryptanalysis of Reduced FOX Block Cipher....Pages 229-241
Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components....Pages 242-260
Cryptanalysis of Sfinks....Pages 261-269
Weaknesses of COSvd (2,128) Stream Cipher....Pages 270-283
Expanding Weak PRF with Small Key Size....Pages 284-298
On Linear Systems of Equations with Distinct Variables and Small Block Size....Pages 299-321
An FPGA Implementation of CCM Mode Using AES....Pages 322-334
New Architecture for Multiplication in GF (2 m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography....Pages 335-351
An Efficient Design of CCMP for Robust Security Network....Pages 352-361
Software-Based Copy Protection for Temporal Media During Dissemination and Playback....Pages 362-377
Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme....Pages 378-388
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms....Pages 389-409
An Efficient Static Blind Ring Signature Scheme....Pages 410-423
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model....Pages 424-440
Yet Another Forward Secure Signature from Bilinear Pairings....Pages 441-455
Back Matter....Pages -