Information Security and Cryptology - ICISC 2010

13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers

  • Kyung-Hyune Rhee
  • DaeHun Nyang
Conference proceedings ICISC 2010

DOI: 10.1007/978-3-642-24209-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6829)

Table of contents (28 papers)

  1. Front Matter
  2. Cryptanalysis

    1. Known and Chosen Key Differential Distinguishers for Block Ciphers
      Ivica Nikolić, Josef Pieprzyk, Przemysław Sokołowski, Ron Steinfeld
      Pages 29-48
    2. Related-Key Attack on the Full HIGHT
      Bonwook Koo, Deukjo Hong, Daesung Kwon
      Pages 49-67
    3. Preimage Attacks against PKC98-Hash and HAS-V
      Yu Sasaki, Florian Mendel, Kazumaro Aoki
      Pages 68-91
  3. Cryptographic Algorithms

    1. Group Signatures are Suitable for Constrained Devices
      Sébastien Canard, Iwen Coisel, Giacomo De Meulenaer, Olivier Pereira
      Pages 133-150
    2. A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW
      Shoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida
      Pages 151-168
  4. Implementation

    1. Efficient Pairing Computation on Elliptic Curves in Hessian Form
      Haihua Gu, Dawu Gu, WenLu Xie
      Pages 169-176
    2. FPGA Implementation of an Improved Attack against the DECT Standard Cipher
      Michael Weiner, Erik Tews, Benedikt Heinz, Johann Heyszl
      Pages 177-188
    3. Chameleon: A Versatile Emulator for Contactless Smartcards
      Timo Kasper, Ingo von Maurich, David Oswald, Christof Paar
      Pages 189-206
  5. Network and Mobile Security

    1. Revisiting Address Space Randomization
      Zhi Wang, Renquan Cheng, Debin Gao
      Pages 207-221
    2. Evaluation of a Spyware Detection System Using Thin Client Computing
      Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis
      Pages 222-232
    3. A Comparative Usability Evaluation of Traditional Password Managers
      Ambarish Karole, Nitesh Saxena, Nicolas Christin
      Pages 233-251
    4. An Adversarial Evaluation of Network Signaling and Control Mechanisms
      Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, Angelos Keromytis
      Pages 252-265
  6. Symmetric Key Cryptography

    1. Protecting White-Box AES with Dual Ciphers
      Mohamed Karroumi
      Pages 278-291

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.

Keywords

authenticated encryption elliptic curve payment systems secure message transmission software exploit

Editors and affiliations

  • Kyung-Hyune Rhee
    • 1
  • DaeHun Nyang
    • 2
  1. 1.Department of IT Convergence Application EngineeringPukyong National UniversityBusanRepublic of Korea
  2. 2.Department of Computer Science and Information TechnologyINHA UniversityIncheonRepublic of Korea

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-24208-3
  • Online ISBN 978-3-642-24209-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349