Skip to main content
  • Conference proceedings
  • © 2004

Information Security and Cryptology - ICISC 2003

6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2971)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2003.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Invited Talk

  3. Digital Signatures I

    1. A Separable Threshold Ring Signature Scheme

      • Joseph K. Liu, Victor K. Wei, Duncan S. Wong
      Pages 12-26
    2. An Efficient Strong Designated Verifier Signature Scheme

      • Shahrokh Saeednia, Steve Kremer, Olivier Markowitch
      Pages 40-54
  4. Primitives

    1. On the Security of a New Variant of OMAC

      • Tetsu Iwata, Kaoru Kurosawa
      Pages 67-78
    2. New Methods to Construct Cheating Immune Functions

      • Wen Ping Ma, Moon Ho Lee
      Pages 79-86
  5. Fast Implementations

    1. A General Expansion Method Using Efficient Endomorphisms

      • Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park
      Pages 112-126
    2. Design of Bit Parallel Multiplier with Lower Time Complexity

      • Seon Ok Lee, Seok Won Jung, Chang Han Kim, Janghong Yoon, Jae-Young Koh, Daeho Kim
      Pages 127-138
  6. Computer Security/Mobile Security

    1. Extended Role Based Access Control and Procedural Restrictions

      • Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee
      Pages 184-196
  7. Voting/Auction Protocols

    1. Secure Double Auction Protocols with Full Privacy Protection

      • Changjie Wang, Ho-fung Leung, Yumin Wang
      Pages 215-229
    2. Sealed-Bid Auctions with Efficient Bids

      • Toru Nakanishi, Daisuke Yamamoto, Yuji Sugiyama
      Pages 230-244
    3. Providing Receipt-Freeness in Mixnet-Based Voting Protocols

      • Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
      Pages 245-258

Other Volumes

  1. Information Security and Cryptology - ICISC 2003

About this book

This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.

Editors and Affiliations

  • Center for Information Security Technologies (CIST), Korea University, Seoul, Korea

    Jong-In Lim

  • CIST (Center for Information Security Technologies), Korea University, Seoul, Korea

    Dong-Hoon Lee

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access