Information Security and Cryptology

7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers

  • Chuan-Kun Wu
  • Moti Yung
  • Dongdai Lin
Conference proceedings Inscrypt 2011

DOI: 10.1007/978-3-642-34704-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7537)

Table of contents (27 papers)

  1. Front Matter
  2. Cryptanalysis vs. Provable Security
    Phong Q. Nguyen
    Pages 22-23
  3. Boosting Scalability in Anomaly-Based Packed Executable Filtering
    Xabier Ugarte-Pedrero, Igor Santos, Pablo G. Bringas
    Pages 24-43
  4. Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
    Nicky Mouha, Qingju Wang, Dawu Gu, Bart Preneel
    Pages 57-76
  5. Adleman-Manders-Miller Root Extraction Method Revisited
    Zhengjun Cao, Qian Sha, Xiao Fan
    Pages 77-85
  6. Multi-pixel Encryption Visual Cryptography
    Teng Guo, Feng Liu, ChuanKun Wu
    Pages 86-92
  7. An Improved Electronic Voting Scheme without a Trusted Random Number Generator
    Yining Liu, Peiyong Sun, Jihong Yan, Yajun Li, Jianyu Cao
    Pages 93-101
  8. Fault Attacks against the Miller Algorithm in Hessian Coordinates
    Jiang Weng, Yunqi Dou, Chuangui Ma
    Pages 102-112
  9. Benchmarking for Steganography by Kernel Fisher Discriminant Criterion
    Wei Huang, Xianfeng Zhao, Dengguo Feng, Rennong Sheng
    Pages 113-130
  10. Improved Tradeoff between Encapsulation and Decapsulation of HK09
    Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu
    Pages 131-141
  11. Non-interactive Deniable Authentication Protocols
    Haibo Tian, Xiaofeng Chen, Zhengtao Jiang
    Pages 142-159
  12. On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3
    Haixin Song, Xiubin Fan, Chuankun Wu, Dengguo Feng
    Pages 160-178
  13. Efficient Self-certified Signatures with Batch Verification
    Nan Li, Yi Mu, Willy Susilo
    Pages 179-194
  14. A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening
    Jiang Zhang, Xiang Xie, Rui Zhang, Zhenfeng Zhang
    Pages 195-209
  15. Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves
    Xusheng Zhang, Shan Chen, Dongdai Lin
    Pages 210-226
  16. Weak-Key Class of MISTY1 for Related-Key Differential Attack
    Yi-bin Dai, Shao-zhen Chen
    Pages 227-236
  17. Cryptanalysis of Reduced-Round KLEIN Block Cipher
    Xiaoli Yu, Wenling Wu, Yanjun Li, Lei Zhang
    Pages 237-250
  18. An Efficient RSA Implementation without Precomputation
    Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, Meng Yu
    Pages 251-268

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.


block cyphers cryptanalysis cryptology encryption schemes random number generators

Editors and affiliations

  • Chuan-Kun Wu
    • 1
  • Moti Yung
    • 2
  • Dongdai Lin
    • 1
  1. 1.Chinese Academy of SciencesInstitute of Information EngineeringBeijingChina
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34703-0
  • Online ISBN 978-3-642-34704-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349