This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.
The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.
Author(s): Serge Lefranc, David Naccache (auth.), Pil Joong Lee, Chae Hoon Lim (eds.)
Series: Lecture Notes in Computer Science 2587
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 544
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems
Cut-&-Paste Attacks with JAVA....Pages 1-15
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption....Pages 16-34
New DSA-Verifiable Signcryption Schemes....Pages 35-47
Convertible Group Undeniable Signatures....Pages 48-61
An Efficient Fail-Stop Signature Scheme Based on Factorization....Pages 62-74
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme....Pages 75-89
System Specification Based Network Modeling for Survivability Testing Simulation....Pages 90-106
A Risk-Sensitive Intrusion Detection Model....Pages 107-117
Applet Verification Strategies for RAM-Constrained Devices....Pages 118-137
Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks....Pages 138-148
Consistent Differential Patterns of Rijndael....Pages 149-163
Hardware Design and Analysis of Block Cipher Components....Pages 164-181
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt....Pages 182-199
On the Efficiency of the Clock Control Guessing Attack....Pages 200-212
Balanced Shrinking Generators....Pages 213-226
On the Universal Hash Functions in Luby-Rackoff Cipher....Pages 226-237
Threshold MACs....Pages 237-252
Ideal Threshold Schemes from MDS Codes....Pages 253-263
New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms....Pages 264-282
Efficient Computations of the Tate Pairing for the Large MOV Degrees....Pages 283-297
Improved Techniques for Fast Exponentiation....Pages 298-312
Efficient Hardware Multiplicative Inverters....Pages 313-326
Ways to Enhance Differential Power Analysis....Pages 327-342
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion....Pages 343-358
A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem....Pages 359-374
Hardware Fault Attack on RSA with CRT Revisited....Pages 374-388
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer....Pages 389-406
Non-interactive Auction Scheme with Strong Privacy....Pages 407-420
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control....Pages 421-432
Speeding Up Secure Sessions Establishment on the Internet....Pages 433-450
On Fairness in Exchange Protocols....Pages 451-465
A Model for Embedding and Authorizing Digital Signatures in Printed Documents....Pages 465-477
A Dynamic Group Key Distribution Scheme with Flexible User Join....Pages 478-496
Efficient Multicast Key Management for Stateless Receivers....Pages 497-509
Fingerprint Verification System Involving Smart Card....Pages 510-524
A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation....Pages 525-533