This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.References  H. E. Burke, aHandbook of bar Coding Systems, a Van Nostrand Reinhold, New York, N.Y., 1984.  T. Kwon ... Symbol Technologies, Boemia, N.Y., 1991,  aQRmaker: Usera#39;s Manual, a Denso Corporation, Aichi, Japan, 1998.
|Title||:||Information Security and Cryptology - ICISC 2002|
|Author||:||Pil Joong Lee, Chae Hoon Lim|
|Publisher||:||Springer - 2003-07-01|