This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006.
The 26 revised full papers presented together with two invited talks have gone through two rounds of reviewing and improvement and were selected from 129 submissions. The papers are organized in topical sections on hash functions, block and stream ciphers, efficient implementation and hardware, network security and access control, mobile communications security, forensics, copyright protection, biometrics, public key cryptosystems, and digital signatures.
Author(s): Serge Vaudenay (auth.), Min Surp Rhee, Byoungcheon Lee (eds.)
Series: Lecture Notes in Computer Science 4296
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 362
Tags: Data Encryption; Discrete Mathematics in Computer Science; Systems and Data Security; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks
Front Matter....Pages -
RFID Privacy Based on Public-Key Cryptography....Pages 1-6
Generic Attacks on Symmetric Ciphers....Pages 7-7
Improved Collision Attack on the Hash Function Proposed at PKC’98....Pages 8-21
Hashing with Polynomials....Pages 22-28
Birthday Paradox for Multi-collisions....Pages 29-40
New Variant of the Self-Shrinking Generator and Its Cryptographic Properties....Pages 41-50
On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher....Pages 51-64
On Algebraic Immunity and Annihilators....Pages 65-80
High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem....Pages 81-93
A High-Speed Square Root Algorithm in Extension Fields....Pages 94-106
The Smallest ARIA Module with 16-Bit Architecture....Pages 107-117
A Simpler Sieving Device: Combining ECM and TWIRL....Pages 118-135
Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks....Pages 136-154
A Time-Frame Based Trust Model for P2P Systems....Pages 155-165
Spatial Context in Role-Based Access Control....Pages 166-178
An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks....Pages 179-193
Mobile RFID Applications and Security Challenges....Pages 194-205
An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time....Pages 206-221
A Copy Protection Technique Using Multi-level Error Coding....Pages 222-232
Digital Rights Management with Right Delegation for Home Networks....Pages 233-245
Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM....Pages 246-256
Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction....Pages 257-266
Cryptanalysis of T-Function-Based Hash Functions....Pages 267-285
Collision Search Attack for 53-Step HAS-160....Pages 286-295
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network....Pages 296-309
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle....Pages 310-327
A New Proxy Signature Scheme Providing Self-delegation....Pages 328-342
Extended Sanitizable Signatures....Pages 343-355
Back Matter....Pages -