Skip to main content
  • Conference proceedings
  • © 2002

Information Security and Cryptology - ICISC 2001

4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2288)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2001.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

    Pages I-XIII
  2. Practical Security in Public-Key Cryptography

    • David Pointcheval
    Pages 1-17
  3. Truncated Differential Cryptanalysis of Camellia

    • Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon
    Pages 32-38
  4. Improved Impossible Differential Cryptanalysis of Rijndael and Crypton

    • Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang
    Pages 39-49
  5. Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding

    • Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor
    Pages 50-50
  6. An IND-CCA2 Public-Key Cryptosystem with Fast Decryption

    • Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi
    Pages 51-71
  7. Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm

    • Dug-Hwan Choi, Seungbok Choi, Dongho Won
    Pages 72-80
  8. Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring

    • Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai
    Pages 81-102
  9. Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation

    • Jaechul Sung, Sangjin Lee, Jongin Lim, Wonil Lee, Okyeon Yi
    Pages 103-113
  10. Decentralized Event Correlation for Intrusion Detection

    • Christopher Krügel, Thomas Toth, Clemens Kerer
    Pages 114-131
  11. Enhancing the Security of Cookies

    • Vorapranee Khu-smith, Chris Mitchell
    Pages 132-145
  12. A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation

    • Yang-Seo Choi, Dong-il Seo, Sung-Won Sohn
    Pages 146-159
  13. Efficient Revocation Schemes for Secure Multicast

    • Hartono Kurnio, Rei Safavi-Naini, Huaxiong Wang
    Pages 160-177
  14. Binary Codes for Collusion-Secure Fingerprinting

    • Gérard Cohen, Simon Litsyn, Gilles Zémor
    Pages 178-185
  15. Copyright Protection of Object-Oriented Software

    • Jarek Pastuszak, Darek Michałek, Josef Pieprzyk
    Pages 186-199
  16. Off-Line Authentication Using Watermarks

    • Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim
    Pages 200-213
  17. Constructions of Cheating Immune Secret Sharing

    • Josef Pieprzyk, Xian-Mo Zhang
    Pages 226-243
  18. Private Computation with Shared Randomness over Broadcast Channel

    • Clemente Galdi, Pino Persiano
    Pages 244-257

Other Volumes

  1. Information Security and Cryptology — ICISC 2001

About this book

Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6–7, 2001. The 63 Building, consisting of 60 stories above the ground and 3 stories underground, stands soaring up into the sky on the island of Youido, the Manhattan of Korea, and ranks by far the tallest of all buildings in the country. The program committee received 102 submissions from 17 countries and regions (Australia, Belgium, China, Denmark, France, Germany, India, Italy, Japan, Korea, The Netherlands, Spain, Taiwan, Thailand, Vietnam, UK, and USA), of which 32 were selected for presentation in 8 sessions. All submissions were anonymously reviewed by at least 3 experts in the relevant areas. There was one invited talk by David Pointcheval (ENS, France) on “Practical Security in Public-Key Cryptography”. We are very grateful to all the program committee members who devoted much e?ort and valuable time to reading and selecting the papers. These p- ceedingscontainthe?nalversionofeachpaperrevisedaftertheconference.Since the revised versions were not checked by the program committee rigorously, the authors must bear full responsibility for the contents of their papers.

Editors and Affiliations

  • International Research center for Information Security (IRIS), Information and Communications University (ICU), Daejeon, Korea

    Kwangjo Kim

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access