My Account Log in

1 option

Information Security and Cryptology - ICISC 2002 : 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers / edited by Pil Joong Lee, Chae Hoon Lim.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Lee, Pil Joong, editor.
Lim, Chae Hoon, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 2587.
Lecture Notes in Computer Science, 0302-9743 ; 2587
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Operating systems (Computers).
Algorithms.
Computer science--Mathematics.
Computer science.
Management information systems.
Cryptology.
Computer Communication Networks.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Management of Computing and Information Systems.
Local Subjects:
Cryptology.
Computer Communication Networks.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Management of Computing and Information Systems.
Physical Description:
1 online resource (XII, 544 pages).
Edition:
First edition 2003.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
System Details:
text file PDF
Summary:
This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.
Contents:
Invited Talk
Cut-&-Paste Attacks with JAVA
Digital Signatures
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption
New DSA-Verifiable Signcryption Schemes
Convertible Group Undeniable Signatures
An Efficient Fail-Stop Signature Scheme Based on Factorization
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme
Internet Security
System Specification Based Network Modeling for Survivability Testing Simulation
A Risk-Sensitive Intrusion Detection Model
Applet Verification Strategies for RAM-Constrained Devices
Block/Stream Ciphers
Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks
Consistent Differential Patterns of Rijndael
Hardware Design and Analysis of Block Cipher Components
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt
Stream Ciphers and Other Primitives
On the Efficiency of the Clock Control Guessing Attack
Balanced Shrinking Generators
On the Universal Hash Functions in Luby-Rackoff Cipher
Threshold MACs
Ideal Threshold Schemes from MDS Codes
Efficient Implementations
New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms
Efficient Computations of the Tate Pairing for the Large MOV Degrees
Improved Techniques for Fast Exponentiation
Efficient Hardware Multiplicative Inverters
Side-Channel Attacks
Ways to Enhance Differential Power Analysis
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion
A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem
Hardware Fault Attack on RSA with CRT Revisited
Cryptographic Protocols I
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer
Non-interactive Auction Scheme with Strong Privacy
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control
Speeding Up Secure Sessions Establishment on the Internet
Cryptographic Protocols II
On Fairness in Exchange Protocols
A Model for Embedding and Authorizing Digital Signatures in Printed Documents
A Dynamic Group Key Distribution Scheme with Flexible User Join
Efficient Multicast Key Management for Stateless Receivers
Biometrics
Fingerprint Verification System Involving Smart Card
A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation.
Other Format:
Printed edition:
ISBN:
978-3-540-36552-5
9783540365525
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account