Advertisement

Information Security and Cryptology - ICISC 2003

6th International Conference, Seoul, Korea, November 27-28, 2003. Revised Papers

  • Jong-In Lim
  • Dong-Hoon Lee

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2971)

Table of contents

  1. Front Matter
  2. Invited Talk

  3. Digital Signatures I

    1. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
      Pages 12-26
    2. Shahrokh Saeednia, Steve Kremer, Olivier Markowitch
      Pages 40-54
  4. Primitives

  5. Fast Implementations

    1. Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park
      Pages 112-126
    2. Seon Ok Lee, Seok Won Jung, Chang Han Kim, Janghong Yoon, Jae-Young Koh, Daeho Kim
      Pages 127-138
  6. Computer Security/Mobile Security

    1. Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee
      Pages 184-196
  7. Voting/Auction Protocols

    1. Changjie Wang, Ho-fung Leung, Yumin Wang
      Pages 215-229
    2. Toru Nakanishi, Daisuke Yamamoto, Yuji Sugiyama
      Pages 230-244
    3. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
      Pages 245-258
    4. Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
      Pages 259-273
  8. Watermarking

  9. Digital Signatures II

    1. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
      Pages 305-319
    2. Jiun-Ming Chen, Bo-Yin Yang
      Pages 320-338
    3. Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang
      Pages 339-351
  10. Authentication/Threshold Protocols

  11. Block/Stream Ciphers

    1. Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee
      Pages 402-417
    2. K. Chen, L. Simpson, M. Henricksen, W. Millan, E. Dawson
      Pages 418-431
    3. Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song et al.
      Pages 432-445
    4. Jongsung Kim, Seokhie Hong, Sangjin Lee, Junghwan Song, Hyungjin Yang
      Pages 446-456
  12. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.

Keywords

Computer algorithms complexity computer security cryptology cryptosystems data security information security internet security mobile security network security networks secure communications security systems security

Editors and affiliations

  • Jong-In Lim
    • 1
  • Dong-Hoon Lee
    • 2
  1. 1.Center for Information Security Technologies (CIST)Korea UniversitySeoulKorea
  2. 2.CIST (Center for Information Security Technologies)Korea UniversitySeoulKorea

Bibliographic information

  • DOI https://doi.org/10.1007/b96249
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-21376-5
  • Online ISBN 978-3-540-24691-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace