to Multimedia Security -- Digital Rights Management for Multimedia -- Multimedia Cryptography -- to Multimedia Encryption -- An Overview of Modern Cryptography -- Important Modern Cryptosystems -- Image Encryption Algorithms -- Video Encryption Algorithms -- Speech and Audio Encryption -- Visual and Audio Secret Sharing -- Multimedia Watermarking -- to Watermarking -- Applications of Digital Wa…
An Overlapping Communication Protocol Using Improved Time-Slot Leasing for Bluetooth WPANs -- Full-Duplex Transmission on the Unidirectional Links of High-Rate Wireless PANs -- Server Supported Routing: A Novel Architecture and Protocol to Support Inter-vehicular Communication -- Energy-Efficient Aggregate Query Evaluation in Sensor Networks -- Data Sampling Control and Compression in Sensor Ne…
Themes and Issues -- Dealing with Terabyte Data Sets in Digital Investigations -- Forensics and Privacy-Enhancing Technologies -- A Network-Based Architecture for Storing Digital Evidence -- Digital Forensics: Meeting the Challenges of Scientific Evidence -- Non-Technical Manipulation of Digital Data -- Investigative Techniques -- Detecting Social Engineering -- A Framework for Email Investigat…
Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficien…
Efficient Collision Search Attacks on SHA-0 -- Finding Collisions in the Full SHA-1 -- Pebbling and Proofs of Work -- Composition Does Not Imply Adaptive Security -- On the Discrete Logarithm Problem on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption -- Unconditional Characteriza…
Algebra and Number Theory -- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log -- Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? -- Adapting Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains -- Multiparty Computation -- Upper Bounds on the Communication Complexity …
Keynote Papers -- Counting by Coin Tossings -- On the Role Definitions in and Beyond Cryptography -- Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments -- Contributed Papers -- Probabilistic Space Partitioning in Constraint Logic Programming -- Chi-Square Matrix: An Approach for Building-Block Identification -- Design Exploration Framework Under Imprecisen…
Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.
Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- Ge…
to Cryptocomplexity -- Foundations of Computer Science and Mathematics -- Foundations of Complexity Theory -- Foundations of Cryptology -- Hierarchies Based on NP -- Randomized Algorithms and Complexity Classes -- RSA Cryptosystem, Primality, and Factoring -- Other Public-Key Cryptosystems and Protocols.Modern cryptology employs mathematically rigorous concepts and methods from complexity theor…