© 2003

Information Security and Cryptology — ICISC 2002

5th International Conference Seoul, Korea, November 28–29, 2002 Revised Papers

  • Pil Joong Lee
  • Chae Hoon Lim


  • Unique visibility

  • State-of-the-art research

  • Fast-track conference proceedings

Conference proceedings ICISC 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2587)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Invited Talk

    1. Serge Lefranc, David Naccache
      Pages 1-15
  3. Digital Signatures

    1. Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim
      Pages 16-34
    2. Jun-Bum Shin, Kwangsu Lee, Kyungah Shim
      Pages 35-47
    3. Yuh-Dauh Lyuu, Ming-Luen Wu
      Pages 48-61
    4. Willy Susilo, Rei Safavi-Naini
      Pages 62-74
  4. Internet Security

    1. Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han
      Pages 107-117
    2. Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen
      Pages 118-137
  5. Block/Stream Ciphers

  6. Stream Ciphers & Other Primitives

    1. Se Ah Choi, Kyeongcheol Yang
      Pages 213-226
    2. Tetsu Iwata, Kaoru Kurosawa
      Pages 226-237
    3. Keith M. Martin, Josef Pieprzyk, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild
      Pages 237-252
    4. Josef Pieprzyk, Xian-Mo Zhang
      Pages 253-263
  7. Efficient Implementations

    1. Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park
      Pages 264-282

About these proceedings


 This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.

The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.


Hardware Information Signatur Smart Card algorithms cryptanalysis cryptographic attacks cryptographic primitives cryptology data encryption data security digital signature systems information security network security security

Editors and affiliations

  • Pil Joong Lee
    • 1
  • Chae Hoon Lim
    • 2
  1. 1.Pohnag University of Science and TechnologyKyungbukKorea
  2. 2.Sejong UniversitySeoulKorea

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking