Information Security and Cryptology – ICISC 2004: 7th by Mike Reiter (auth.), Choon-sik Park, Seongtaek Chee (eds.)

Posted by

By Mike Reiter (auth.), Choon-sik Park, Seongtaek Chee (eds.)

This booklet constitutes the completely refereed postproceedings of the seventh foreign convention on info safeguard and Cryptology, ICISC 2004, held in Seoul, Korea in December 2004.

The 34 revised complete papers offered have undergone rounds of reviewing and development and have been chosen from 194 submissions. The papers are prepared in topical sections on block ciphers and movement ciphers, public key cryptosystems, PKI and similar implementations, electronic signatures, elliptic curve cryptosystems, provable defense and primitives, community safeguard, steganography, and biometrics.

Show description

Read Online or Download Information Security and Cryptology – ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers PDF

Similar international conferences and symposiums books

Next Generation Information Technologies and Systems: 5th International Workshop, NGITS 2002 Caesarea, Israel, June 24–25, 2002 Proceedings

NGITS2002 was once the ? fth workshop of its type, selling papers that debate new applied sciences in info structures. Following the good fortune of the 4 p- vious workshops (1993, 1995, 1997, and 1999), the ? fth NGITS Workshop happened on June 24–25, 2002, within the historic urban of Caesarea. according to the decision for Papers, 22 papers have been submitted.

Knowledge Discovery in Inductive Databases: 4th International Workshop, KDID 2005, Porto, Portugal, October 3, 2005, Revised Selected and Invited Papers

The4thInternationalWorkshoponKnowledgeDiscoveryinInductiveDatabases (KDID 2005) used to be held in Porto, Portugal, on October three, 2005 together with the sixteenth ecu convention on computing device studying and the ninth ecu convention on ideas and perform of information Discovery in Databases. Ever because the begin of the ?

Rules and Rule Markup Languages for the Semantic Web: First International Conference, RuleML 2005, Galway, Ireland, November 10-12, 2005. Proceedings

RuleML 2005 was once the ? rst overseas convention on principles and rule markup languages for the Semantic internet, held at the side of the overseas Semantic net C- ference (ISWC) at Galway, eire. With the luck of the RuleML workshop sequence got here the necessity for prolonged learn and functions issues prepared in a convention layout.

Annual World Bank Conference on Development Economics-Europe 2003: Toward Pro-Poor Policies--Aid, Institutions, and Globalization

The once a year global financial institution convention on improvement Economics (ABCDE) brings jointly the world's most interesting improvement thinkers to offer their views and ideas. in recent times, a parallel, moment convention has been held in Europe with an analogous objective of increasing the circulate of rules among thinkers, practitioners, and policymakers within the box of foreign improvement.

Additional info for Information Security and Cryptology – ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers

Sample text

To specify such variables, we define U, V as U = {i|1 ≤ i ≤ k, xi depends on xt }, V = {j|1 ≤ j ≤ l, yj depends on xt }. -S. Cho et al. Let α = #U + #V. Note that α ≥ βd by the definition of the branch number. By defining U c = {1, · · · , k} − U, V c = {1, · · · , l} − V, we have that k l DP Si (ai , xi ) DP Sj (yj , bj ) i=1 (x1 ,··· ,xk ,0,··· ,0)∈BL (γa ,γb ) j=1 ≤ DP Si (ai , xi ))( ( x1 ,··· ,xt−1 i∈U c where Φt = obtain that i∈U DP Si (ai , xi ))( DP Si (ai , xi ))( ( xt xt ( i∈U j∈V DP Sj (yj , bj ))Φt .

2259, Springer-Verlag, pp. 112-128, 2001. 11. L. Keliher, Refined Anlaysis of Bounds Related to Linear and Differential Cryptanalysis for the AES, Fourth Conference on the Advanced Encryption Standard (AES4). 12. D. Kwon, J. Kim, S. H. Sung, Y. H. Song, Y. Yeom, E-J. Yoon, S, Lee, J. Lee, S. Chee, D. Han, and J. Hong, New block cipher: ARIA, ICISC 2003, LNCS 2971, pp. 432-445, 2004. 13. M. Matsui, Linear cryptanalysis method for DES cipher, Advance in CryptologyEurocrypt’93, LNCS Vol. 765, Springer-Verlag, pp.

The running time is 200,000 hours on a single Sun Ultra 5. Park et al. [15, 16] proposed a method for upper bounding on the MDP and MLHP for AES-like structures. 075 × 2−106 , respectively. Although the method of Park et al. [15, 16] produces good upper bounds for AES-like structures, it does not apply to other SPNs (for example ARIA). To find upper bounds on the MDP and MLHP for SPNs, one first finds upper bounds for 2-round and then use a recursive technique for 3 or more rounds. Thus it is very important to find effective upper bounds for 2-round SPNs.

Download PDF sample

Rated 4.61 of 5 – based on 23 votes