Information Security and Cryptology - ICISC 2014

17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers

  • Jooyoung Lee
  • Jongsung Kim
Conference proceedings ICISC 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8949)

Also part of the Security and Cryptology book sub series (LNSC, volume 8949)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. RSA Security

    1. Front Matter
      Pages 1-1
    2. Ivan Damgård, Gert Læssøe Mikkelsen, Tue Skeltved
      Pages 18-33
  3. Digital Signature

  4. Public Key Cryptography

    1. Front Matter
      Pages 67-67
    2. Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
      Pages 84-100
  5. Block Ciphers

    1. Front Matter
      Pages 115-115
    2. Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, Masakatu Morii
      Pages 117-131
    3. Jung-Keun Lee, Bonwook Koo, Dongyoung Roh, Woo-Hwan Kim, Daesung Kwon
      Pages 132-159
    4. Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
      Pages 160-174
    5. Junko Takahashi, Toshinori Fukunaga
      Pages 175-189
  6. Network Security

    1. Front Matter
      Pages 191-191
    2. Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu
      Pages 193-204
    3. Abdelrahaman Aly, Mathieu Van Vyve
      Pages 205-221
    4. Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar
      Pages 222-237
  7. Mobile Security

    1. Front Matter
      Pages 239-239
    2. Su Mon Kywe, Yingjiu Li, Robert H. Deng, Jason Hong
      Pages 241-254
    3. Xueqiang Wang, Yuewu Wang, Limin Liu, Lingguang Lei, Jiwu Jing
      Pages 255-268
  8. Hash Functions

    1. Front Matter
      Pages 269-269
    2. Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji
      Pages 271-285
    3. Dong-Chan Kim, Deukjo Hong, Jung-Keun Lee, Woo-Hwan Kim, Daesung Kwon
      Pages 286-313
  9. Information Hiding and Efficiency

    1. Front Matter
      Pages 315-315
    2. Cheonshik Kim, Jinsuk Baek, Paul S. Fisher
      Pages 317-327
    3. Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim
      Pages 328-342
  10. Cryptographic Protocol

    1. Front Matter
      Pages 361-361
    2. Ioana Boureanu, Serge Vaudenay
      Pages 381-401
    3. Vandana Guleria, Ratna Dutta
      Pages 402-418
  11. Side-Channel Attacks

    1. Front Matter
      Pages 419-419
    2. Mohamed Saied Emam Mohamed, Johannes Buchmann
      Pages 433-446
  12. Back Matter
    Pages 447-448

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.


AES Application Plagiarism Ciphers Cryptanalysis Cryptographic Protocols Data Hiding Digital Watermarking Embedded Systems Fault Analysis Fingerprint Formal Methods Hash Functions Oblivious Transfer Phishing Post-Quantum Cryptography Provable Security Public-Key Cryptography Security Model Side-Channel Analysis Social Network Security

Editors and affiliations

  • Jooyoung Lee
    • 1
  • Jongsung Kim
    • 2
  1. 1.Sejong UniversitySeoulKorea, Republic of (South Korea)
  2. 2.Kookmin UniversitySeoulKorea, Republic of (South Korea)

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-15942-3
  • Online ISBN 978-3-319-15943-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site