Skip to main content
  • Conference proceedings
  • © 2005

Information Security and Cryptology - ICISC 2004

7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3506)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2004.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

  2. Invited Talks

    1. Security for Ubiquitous Computing

      • Frank Stajano
      Pages 2-2
  3. Block Cipher and Stream Cipher

    1. New Method for Bounding the Maximum Differential Probability for SPNs and ARIA

      • Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim
      Pages 21-32
    2. Dragon: A Fast Word Based Stream Cipher

      • Kevin Chen, Matt Henricksen, William Millan, Joanne Fuller, Leonie Simpson, Ed Dawson et al.
      Pages 33-50
  4. Public Key Cryptosystem

    1. An Efficient and Verifiable Solution to the Millionaire Problem

      • Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
      Pages 51-66
    2. All in the XL Family: Theory and Practice

      • Bo-Yin Yang, Jiun-Ming Chen
      Pages 67-86
    3. Efficient Broadcast Encryption Using Multiple Interpolation Methods

      • Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim
      Pages 87-103
    4. On Private Scalar Product Computation for Privacy-Preserving Data Mining

      • Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen
      Pages 104-120
  5. PKI and Related Implementation

    1. Separable Implicit Certificate Revocation

      • Dae Hyun Yum, Pil Joong Lee
      Pages 121-136
    2. Improvement on Ha-Moon Randomized Exponentiation Algorithm

      • Sung-Ming Yen, Chien-Ning Chen, SangJae Moon, JaeCheol Ha
      Pages 154-167
  6. Digital Signature

    1. On Subliminal Channels in Deterministic Signature Schemes

      • Jens-Matthias Bohli, Rainer Steinwandt
      Pages 182-194
    2. Threshold Entrusted Undeniable Signature

      • Seungjoo Kim, Dongho Won
      Pages 195-203
    3. On the Security Models of (Threshold) Ring Signature Schemes

      • Joseph K. Liu, Duncan S. Wong
      Pages 204-217
    4. Identity Based Threshold Ring Signature

      • Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
      Pages 218-232
    5. Batch Verifications with ID-Based Signatures

      • HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
      Pages 233-248
  7. Elliptic Curve Cryptosystem

    1. A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method

      • Yasuyuki Nogami, Yoshitaka Morikawa
      Pages 249-260

Other Volumes

  1. Information Security and Cryptology – ICISC 2004

Editors and Affiliations

  • National Security Research Institute, Daejeon, Korea

    Choon-sik Park

  • National Security Research Institute (NSRI), Daejeon, Korea

    Seongtaek Chee

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access