Information Security and Cryptology

Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

  • Editors
  • Dingyi Pei
  • Moti Yung
  • Dongdai Lin
  • Chuankun Wu
Conference proceedings Inscrypt 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4990)

Table of contents

  1. Front Matter
  2. Invited Talks

    1. Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
      Pages 1-4
  3. Digital Signature Schemes

  4. Block Cipher

    1. B. Collard, F. -X. Standaert, J. -J. Quisquater
      Pages 51-65
  5. Key Management

    1. Junwu Dong, Dingyi Pei, Xueli Wang
      Pages 81-92
    2. K. Chalkias, S. T. Halkidis, D. Hristu-Varsakelis, G. Stephanides, A. Alexiadis
      Pages 108-122
  6. Zero Knowledge and Secure Computation Protocols

  7. Secret Sharing

    1. Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
      Pages 167-181
    2. Daoshun Wang, Xiaobo Li, Feng Yi
      Pages 192-200
  8. Stream Cipher and Pseudorandomness

    1. Sultan Al Hinai, Lynn Margaret Batten, Bernard Colbert
      Pages 201-215
    2. Zhixiong Chen, Ning Zhang, Guozhen Xiao
      Pages 231-245

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007.

The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security.

Keywords

Boolean function Public Key Trusted Computing data security information privacy security trust

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-79499-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-79498-1
  • Online ISBN 978-3-540-79499-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book