This book constitutes the thoroughly refereed postproceedings of the 7th International Conference on Information Security and Cryptology, ICISC 2004, held in Se
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul,