Advertisement

Information Security and Cryptology -- ICISC 2013

16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers

  • Hyang-Sook Lee
  • Dong-Guk Han

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8565)

Also part of the Security and Cryptology book sub series (LNSC, volume 8565)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Secure Multiparty Computation

    1. Front Matter
      Pages 1-1
    2. Kim Le, Parmesh Ramanathan, Kewal K. Saluja
      Pages 3-19
    3. Hervé Chabanne, Gérard Cohen, Alain Patey
      Pages 34-46
  3. Proxy Re-encryption

    1. Front Matter
      Pages 47-47
    2. Sébastien Canard, Julien Devigne
      Pages 49-66
    3. Kang Yang, Jing Xu, Zhenfeng Zhang
      Pages 67-88
  4. Side Channel Analysis and Its Countermeasures

    1. Front Matter
      Pages 89-89
    2. Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann
      Pages 91-108
  5. Cryptanalysis 1

    1. Front Matter
      Pages 121-121
    2. Xuexin Zheng, Keting Jia
      Pages 123-143
    3. Gildas Avoine, Xavier Carpent
      Pages 144-157
    4. Xiaoqian Li, Bao Li, Wenling Wu, Xiaoli Yu, Ronglin Hao, Bingke Ma
      Pages 158-172
  6. Cryptanalysis 2

    1. Front Matter
      Pages 173-173
    2. Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef
      Pages 175-188
  7. Embedded System Security and Its Implementation

    1. Front Matter
      Pages 225-225
    2. Hua Chen, Limin Fan
      Pages 227-240
    3. Shohreh Sharif Mansouri, Elena Dubrova
      Pages 241-255
    4. Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi et al.
      Pages 256-274
  8. Primitives for Cryptography

    1. Front Matter
      Pages 275-275
    2. Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee
      Pages 277-292
    3. Martin R. Albrecht, Robert Fitzpatrick, Florian Göpfert
      Pages 293-310
  9. Digital Signature

    1. Front Matter
      Pages 323-323
    2. Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang
      Pages 325-341
    3. K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan
      Pages 342-362
    4. Toru Nakanishi, Tomoya Nomura, Nobuo Funabiki
      Pages 363-378
  10. Security Protocol

    1. Front Matter
      Pages 379-379
    2. Mohammad Etemad, Alptekin Küpçü
      Pages 381-399
    3. Shogo Hajime, Yohei Watanabe, Junji Shikata
      Pages 400-417
    4. Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
      Pages 418-434
  11. Cyber Security

    1. Front Matter
      Pages 453-453
    2. Jiyoung Woo, Hyun Jae Kang, Ah Reum Kang, Hyukmin Kwon, Huy Kang Kim
      Pages 469-482
    3. Janis Danisevskis, Marta Piekarska, Jean-Pierre Seifert
      Pages 483-495
    4. Stephen Bono, Jacob Thompson
      Pages 496-513
  12. Public Key Cryptography

    1. Front Matter
      Pages 515-515
    2. K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan
      Pages 517-535
  13. Back Matter
    Pages 537-538

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.

Keywords

AES botnet ciphers cloud storage cryptanalysis cryptographic protocols differential attack hash functions oblivious transfer phishing provable security security model signcryption social network security spam email visualization

Editors and affiliations

  • Hyang-Sook Lee
    • 1
  • Dong-Guk Han
    • 2
  1. 1.EWHA Womans UniversitySeoulKorea, Republic of (South Korea)
  2. 2.Kookmin UniversitySeoulKorea, Republic of (South Korea)

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-12160-4
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-12159-8
  • Online ISBN 978-3-319-12160-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site