This book constitutes the thoroughly refereed postproceedings of the 7th International Conference on Information Security and Cryptology, ICISC 2004, held in Seoul, Korea in December 2004.
The 34 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 194 submissions. The papers are organized in topical sections on block ciphers and stream ciphers, public key cryptosystems, PKI and related implementations, digital signatures, elliptic curve cryptosystems, provable security and primitives, network security, steganography, and biometrics.
Author(s): Mike Reiter (auth.), Choon-sik Park, Seongtaek Chee (eds.)
Series: Lecture Notes in Computer Science 3506 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 490
Tags: Data Encryption; Discrete Mathematics in Computer Science; Operating Systems; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks
Front Matter....Pages -
Security by, and for, Converged Mobile Devices....Pages 1-1
Security for Ubiquitous Computing....Pages 2-2
Algebraic Attacks on Combiners with Memory and Several Outputs....Pages 3-20
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA....Pages 21-32
Dragon: A Fast Word Based Stream Cipher....Pages 33-50
An Efficient and Verifiable Solution to the Millionaire Problem....Pages 51-66
All in the XL Family: Theory and Practice....Pages 67-86
Efficient Broadcast Encryption Using Multiple Interpolation Methods....Pages 87-103
On Private Scalar Product Computation for Privacy-Preserving Data Mining....Pages 104-120
Separable Implicit Certificate Revocation....Pages 121-136
Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation....Pages 137-153
Improvement on Ha-Moon Randomized Exponentiation Algorithm....Pages 154-167
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields....Pages 168-181
On Subliminal Channels in Deterministic Signature Schemes....Pages 182-194
Threshold Entrusted Undeniable Signature....Pages 195-203
On the Security Models of (Threshold) Ring Signature Schemes....Pages 204-217
Identity Based Threshold Ring Signature....Pages 218-232
Batch Verifications with ID-Based Signatures....Pages 233-248
A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method....Pages 249-260
Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations....Pages 261-278
New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method....Pages 279-295
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors....Pages 296-312
On the Pseudorandomness of a Modification of KASUMI Type Permutations....Pages 313-329
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model....Pages 330-342
Padding Oracle Attacks on Multiple Modes of Operation....Pages 343-351
An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes....Pages 352-361
Identity-Based Access Control for Ad Hoc Groups....Pages 362-379
Mobile Mixing....Pages 380-393
A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems....Pages 394-406
ADWICE – Anomaly Detection with Real-Time Incremental Clustering....Pages 407-424
Steganography for Executables and Code Transformation Signatures....Pages 425-439
On Security Notions for Steganalysis....Pages 440-454
A Block Oriented Fingerprinting Scheme in Relational Database....Pages 455-466
A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis....Pages 467-477
Profile-Based 3D Face Registration and Recognition....Pages 478-488
Back Matter....Pages -