Information security and cryptology -- ICISC 2003. 6th international conference, Seoul, Korea, November 27--28, 2003. Revised papers (Q1881751)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Information security and cryptology -- ICISC 2003. 6th international conference, Seoul, Korea, November 27--28, 2003. Revised papers |
scientific article; zbMATH DE number 2108204
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Information security and cryptology -- ICISC 2003. 6th international conference, Seoul, Korea, November 27--28, 2003. Revised papers |
scientific article; zbMATH DE number 2108204 |
Statements
Information security and cryptology -- ICISC 2003. 6th international conference, Seoul, Korea, November 27--28, 2003. Revised papers (English)
0 references
15 October 2004
0 references
The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1015.00034). Indexed articles: \textit{Katz, Jonathan}, Binary tree encryption: Constructions and applications, 1-11 [Zbl 1092.68598] \textit{Liu, Joseph K.; Wei, Victor K.; Wong, Duncan S.}, A separable threshold ring signature scheme, 12-26 [Zbl 1092.68602] \textit{Wang, Guilin}, On the security of a group signature scheme with forward security, 27-39 [Zbl 1092.94517] \textit{Saeednia, Shahrokh; Kremer, Steve; Markowitch, Olivier}, An efficient strong designated verifier signature scheme, 40-54 [Zbl 1092.94514] \textit{Laud, Peeter; Corin, Ricardo}, Sound computational interpretation of formal encryption with composed keys, 55-66 [Zbl 1092.68600] \textit{Iwata, Tetsu; Kurosawa, Kaoru}, On the security of a new variant of OMAC, 67-78 [Zbl 1092.68597] \textit{Ma, Wen Ping; Lee, Moon Ho}, New methods to construct cheating immune functions, 79-86 [Zbl 1092.94512] \textit{Hirose, Shoichi}, Yet another definition of weak collision resistance and its analysis, 87-96 [Zbl 1092.94506] \textit{Choie, YoungJu; Lee, Eunjeong}, Implementation of Tate pairing on hyperelliptic curves of genus 2, 97-111 [Zbl 1092.94504] \textit{Park, Tae-Jun; Lee, Mun-Kyu; Kim, E-yong; Park, Kunsoo}, A general expansion method using efficient endomorphisms, 112-126 [Zbl 1092.11048] \textit{Lee, Seon Ok; Jung, Seok Won; Kim, Chang Han; Yoon, Janghong; Koh, Jae-Young; Kim, Daeho}, Design of bit parallel multiplier with lower time complexity, 127-139 [Zbl 1092.68505] \textit{Yoon, Joong Chul; Jung, Seok Won; Lee, Sungwoo}, Architecture for an elliptic curve scalar multiplication resistant to some side-channel attacks, 139-151 [Zbl 1092.68506] \textit{Park, Tae-Jun; Lee, Mun-Kyu; Park, Kunsoo}, Efficient scalar multiplication in hyperelliptic curves using a new Frobenius expansion, 152-165 [Zbl 1092.11049] \textit{Zhang, Muxiang}, Adaptive protocol for entity authentication and key agreement in mobile networks, 166-183 [Zbl 1092.68610] \textit{Shin, Wook; Lee, Dong-Ik; Kim, Hyoung-Chun; Kang, Jung-Min; Lee, Jin-Seok}, Extended role based access control and procedural restrictions, 184-196 [Zbl 1092.68607] \textit{Zhang, Yuan; Chung, Moon Jung; Kim, Hyun}, Layer-based access control model in the manufacturing infrastructure and design automation system, 197-214 [Zbl 1092.68611] \textit{Wang, Changjie; Leung, Ho-fung; Wang, Yumin}, Secure double auction protocols with full privacy protection, 215-229 [Zbl 1092.68609] \textit{Nakanishi, Toru; Yamamoto, Daisuke; Sugiyama, Yuji}, Sealed-bid auctions with efficient bids, 230-244 [Zbl 1092.68604] \textit{Lee, Byoungcheon; Boyd, Colin; Dawson, Ed; Kim, Kwangjo; Yang, Jeongmo; Yoo, Seungjae}, Providing receipt-freeness in mixnet-based voting protocols, 245-258 [Zbl 1092.68601] \textit{Chen, Xiaofeng; Lee, Byoungcheon; Kim, Kwangjo}, Receipt-free electronic auction schemes using homomorphic encryption, 259-273 [Zbl 1092.68593] \textit{Myles, Ginger; Collberg, Christian}, Software watermarking through register allocation: Implementation, analysis, and attacks, 274-293 [Zbl 1092.68603] \textit{Gu, Limin; Huang, Jiwu; Chen, Zewen}, Analysis of the bounds for linear block codes in watermark channel, 294-304 [Zbl 1092.68596] \textit{Wang, Guilin; Bao, Feng; Zhou, Jianying; Deng, Robert H.}, Security analysis of some proxy signatures, 305-319 [Zbl 1092.94518] \textit{Chen, Jiun-Ming; Yang, Bo-Yin}, A more secure and efficacious TTS signature scheme, 320-338 [Zbl 1092.94501] \textit{Chen, Zewen; Wang, Jilin; Wang, Yumin; Huang, Jiwu; Huang, Daren}, An efficient revocation algorithm in group signatures, 339-351 [Zbl 1092.94503] \textit{Chow, Sherman S. M.; Yiu, S. M.; Hui, Lucas C. K.; Chow, K. P.}, Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity, 352-369 [Zbl 1092.94505] \textit{Ma, Wen Ping; Lee, Moon Ho}, Group oriented cryptosystems based on linear access structures, 370-376 [Zbl 1092.94511] \textit{Tso, Raylin; Miao, Ying; Okamoto, Eiji}, A new algorithm for searching a consistent set of shares in a threshold scheme with cheaters, 377-385 [Zbl 1092.94516] \textit{Susilo, Willy; Mu, Yi}, Non-interactive deniable ring authentication, 386-401 [Zbl 1092.94515] \textit{Hong, Seokhie; Hong, Deukjo; Ko, Youngdai; Chang, Donghoon; Lee, Wonil; Lee, Sangjin}, Differential cryptanalysis of TEA and XTEA, 402-417 [Zbl 1092.94507] \textit{Chen, K.; Simpson, L.; Henricksen, M.; Millan, W.; Dawson, E.}, A complete divide and conquer attack on the Alpha1 stream cipher, 418-431 [Zbl 1092.94502] \textit{Kwon, Daesung; Kim, Jaesung; Park, Sangwoo; Sung, Soo Hak; Sohn, Yaekwon; Song, Jung Hwan; Yeom, Yongjin; Yoon, E-Joong; Lee, Sangjin; Lee, Jaewon; Chee, Seongtaek; Han, Daewan; Hong, Jin}, New block cipher: ARIA, 432-445 [Zbl 1092.94509] \textit{Kim, Jongsung; Hong, Seokhie; Lee, Sangjin; Song, Junghwan; Yang, Hyungjin}, Truncated differential attacks on 8-round CRYPTON, 446-456 [Zbl 1092.94508]
0 references