Advertisement

Information Security and Cryptology – ICISC 2004

7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers

  • Choon-sik Park
  • Seongtaek Chee
Conference proceedings ICISC 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3506)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Block Cipher and Stream Cipher

    1. Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim
      Pages 21-32
    2. Kevin Chen, Matt Henricksen, William Millan, Joanne Fuller, Leonie Simpson, Ed Dawson et al.
      Pages 33-50
  4. Public Key Cryptosystem

    1. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
      Pages 51-66
    2. Bo-Yin Yang, Jiun-Ming Chen
      Pages 67-86
    3. Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim
      Pages 87-103
    4. Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen
      Pages 104-120
  5. PKI and Related Implementation

    1. Dae Hyun Yum, Pil Joong Lee
      Pages 121-136
    2. Sung-Ming Yen, Chien-Ning Chen, SangJae Moon, JaeCheol Ha
      Pages 154-167
  6. Digital Signature

    1. Jens-Matthias Bohli, Rainer Steinwandt
      Pages 182-194
    2. Seungjoo Kim, Dongho Won
      Pages 195-203
    3. Joseph K. Liu, Duncan S. Wong
      Pages 204-217
    4. Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
      Pages 218-232
    5. HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
      Pages 233-248
  7. Elliptic Curve Cryptosystem

    1. Yasuyuki Nogami, Yoshitaka Morikawa
      Pages 249-260
    2. Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos Zaroliagis
      Pages 261-278
    3. Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi
      Pages 296-312
  8. Provable Security and Primitives

    1. Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee
      Pages 313-329
    2. Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong
      Pages 343-351
  9. Network Security

    1. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
      Pages 362-379
    2. Marcin Gogolewski, Mirosław Kutyłowski, Tomasz Łuczak
      Pages 380-393
    3. Minsoo Lee, Jintaek Kim, Sehyun Park, Ohyoung Song, Sungik Jun
      Pages 394-406
    4. Kalle Burbeck, Simin Nadjm-Tehrani
      Pages 407-424
  10. Steganography

    1. Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere
      Pages 425-439
    2. Kisik Chang, Robert H. Deng, Bao Feng, Sangjin Lee, Hyungjun Kim, Jongin Lim
      Pages 440-454
    3. Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao
      Pages 455-466
  11. Biometrics

    1. Y. Han, C. Ryu, J. Moon, H. Kim, H. Choi
      Pages 467-477
    2. Chao Li, Armando Barreto
      Pages 478-488
  12. Back Matter

About these proceedings

Keywords

Code Information Oracle Windows algorithm algorithms biometric security cryptanalysis cryptography database digital signatures information security internet security mobile security network security

Editors and affiliations

  • Choon-sik Park
    • 1
  • Seongtaek Chee
    • 2
  1. 1.National Security Research InstituteDaejeonKorea
  2. 2.National Security Research Institute (NSRI)DaejeonKorea

Bibliographic information

  • DOI https://doi.org/10.1007/b137120
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-26226-8
  • Online ISBN 978-3-540-32083-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace