Information Security and Cryptology – ICISC 2008

11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers

  • Pil Joong Lee
  • Jung Hee Cheon
Conference proceedings ICISC 2008

DOI: 10.1007/978-3-642-00730-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5461)

Table of contents (26 papers)

  1. Front Matter
  2. Public Key Encryption

    1. Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
      Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
      Pages 1-19
    2. Distributed Attribute-Based Encryption
      Sascha Müller, Stefan Katzenbeisser, Claudia Eckert
      Pages 20-36
    3. Simple Algorithms for Computing a Sequence of 2-Isogenies
      Reo Yoshida, Katsuyuki Takashima
      Pages 52-65
  3. Key Management and Secret Sharing

  4. Privacy and Digital Rights

    1. The Swiss-Knife RFID Distance Bounding Protocol
      Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira
      Pages 98-115
    2. Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique
      Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili
      Pages 116-133
    3. Anonymous Fingerprinting for Predelivery of Contents
      Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara
      Pages 134-151
    4. Instruction Set Limitation in Support of Software Diversity
      Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet, Koen De Bosschere
      Pages 152-165
  5. Digital Signature and Voting

    1. Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
      Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee
      Pages 166-183
    2. How to Balance Privacy with Authenticity
      Pairat Thorncharoensri, Willy Susilo, Yi Mu
      Pages 184-201
  6. Side Channel Attack

  7. Hash and MAC

    1. Extended Models for Message Authentication
      Liting Zhang, Wenling Wu, Peng Wang
      Pages 286-301
    2. A Preimage Attack for 52-Step HAS-160
      Yu Sasaki, Kazumaro Aoki
      Pages 302-317

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008.

The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.

Keywords

Public Key access control algebraic attack anonymity authentication collision copyright protection cryptanalysis cryptographic primitives cryptology cryptosystems data security information privacy

Editors and affiliations

  • Pil Joong Lee
    • 1
  • Jung Hee Cheon
    • 2
  1. 1.Department of Electronic and Electrical EngineeringPohang University of Science and Technology (POSTECH)PohangKorea
  2. 2.Department of Mathematical SciencesSeoul National UniversitySeoulKorea

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-00729-3
  • Online ISBN 978-3-642-00730-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349