Skip to main content
  • Conference proceedings
  • © 2014

Information Security and Cryptology -- ICISC 2013

16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8565)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

    Pages I-XIII
  2. Secure Multiparty Computation

    1. Front Matter

      Pages 1-1
    2. Privacy Assurances in Multiple Data-Aggregation Transactions

      • Kim Le, Parmesh Ramanathan, Kewal K. Saluja
      Pages 3-19
    3. Towards Secure Two-Party Computation from the Wire-Tap Channel

      • Hervé Chabanne, Gérard Cohen, Alain Patey
      Pages 34-46
  3. Proxy Re-encryption

    1. Front Matter

      Pages 47-47
    2. Combined Proxy Re-encryption

      • Sébastien Canard, Julien Devigne
      Pages 49-66
    3. Certificateless Proxy Re-Encryption Without Pairings

      • Kang Yang, Jing Xu, Zhenfeng Zhang
      Pages 67-88
  4. Side Channel Analysis and Its Countermeasures

    1. Front Matter

      Pages 89-89
    2. Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes

      • Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann
      Pages 91-108
  5. Cryptanalysis 1

    1. Front Matter

      Pages 121-121
    2. Impossible Differential Attack on Reduced-Round TWINE

      • Xuexin Zheng, Keting Jia
      Pages 123-143
    3. Optimal Storage for Rainbow Tables

      • Gildas Avoine, Xavier Carpent
      Pages 144-157
    4. First Multidimensional Cryptanalysis on Reduced-Round \(\mathrm{PRINCE }_{core}\)

      • Xiaoqian Li, Bao Li, Wenling Wu, Xiaoli Yu, Ronglin Hao, Bingke Ma
      Pages 158-172
  6. Cryptanalysis 2

    1. Front Matter

      Pages 173-173
    2. Rebound Attacks on Stribog

      • Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef
      Pages 175-188
  7. Embedded System Security and Its Implementation

    1. Front Matter

      Pages 225-225

Other Volumes

  1. Information Security and Cryptology -- ICISC 2013

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.

Editors and Affiliations

  • EWHA Womans University, Seoul, Korea, Republic of (South Korea)

    Hyang-Sook Lee

  • Kookmin University, Seoul, Korea, Republic of (South Korea)

    Dong-Guk Han

Bibliographic Information

  • Book Title: Information Security and Cryptology -- ICISC 2013

  • Book Subtitle: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers

  • Editors: Hyang-Sook Lee, Dong-Guk Han

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-12160-4

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2014

  • Softcover ISBN: 978-3-319-12159-8Published: 31 October 2014

  • eBook ISBN: 978-3-319-12160-4Published: 18 October 2014

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIII, 538

  • Number of Illustrations: 94 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access