Skip to main content
  • Conference proceedings
  • © 2003

Information Security and Cryptology - ICISC 2002

5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers

  • Unique visibility
  • State-of-the-art research
  • Fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2587)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2002.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

    Pages I-XI
  2. Invited Talk

    1. Cut-&-Paste Attacks with JAVA

      • Serge Lefranc, David Naccache
      Pages 1-15
  3. Digital Signatures

    1. Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption

      • Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim
      Pages 16-34
    2. New DSA-Verifiable Signcryption Schemes

      • Jun-Bum Shin, Kwangsu Lee, Kyungah Shim
      Pages 35-47
    3. Convertible Group Undeniable Signatures

      • Yuh-Dauh Lyuu, Ming-Luen Wu
      Pages 48-61
    4. An Efficient Fail-Stop Signature Scheme Based on Factorization

      • Willy Susilo, Rei Safavi-Naini
      Pages 62-74
  4. Internet Security

    1. A Risk-Sensitive Intrusion Detection Model

      • Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han
      Pages 107-117
    2. Applet Verification Strategies for RAM-Constrained Devices

      • Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen
      Pages 118-137
  5. Block/Stream Ciphers

    1. Consistent Differential Patterns of Rijndael

      • Beomsik Song, Jennifer Seberry
      Pages 149-163
    2. Hardware Design and Analysis of Block Cipher Components

      • Lu Xiao, Howard M. Heys
      Pages 164-181
  6. Stream Ciphers & Other Primitives

    1. Balanced Shrinking Generators

      • Se Ah Choi, Kyeongcheol Yang
      Pages 213-226
    2. On the Universal Hash Functions in Luby-Rackoff Cipher

      • Tetsu Iwata, Kaoru Kurosawa
      Pages 226-237
    3. Threshold MACs

      • Keith M. Martin, Josef Pieprzyk, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild
      Pages 237-252
    4. Ideal Threshold Schemes from MDS Codes

      • Josef Pieprzyk, Xian-Mo Zhang
      Pages 253-263
  7. Efficient Implementations

    1. New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms

      • Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park
      Pages 264-282

Other Volumes

  1. Information Security and Cryptology — ICISC 2002

About this book

 This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.

The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.

Editors and Affiliations

  • Pohnag University of Science and Technology, Kyungbuk, Korea

    Pil Joong Lee

  • Sejong University, Seoul, Korea

    Chae Hoon Lim

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access