Information, Security and Cryptology – ICISC 2009

12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers

  • Donghoon Lee
  • Seokhie Hong
Conference proceedings ICISC 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5984)

Table of contents

  1. Front Matter
  2. Key Management and Key Exchange

    1. M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis
      Pages 1-15
    2. Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu
      Pages 16-33
    3. Georg Lippold, Colin Boyd, Juan Manuel González Nieto
      Pages 34-46
  3. Public Key Cryptography

    1. Yumi Sakemi, Shoichi Takeuchi, Yasuyuki Nogami, Yoshitaka Morikawa
      Pages 47-64
    2. Eric Brier, David Naccache, Mehdi Tibouchi
      Pages 65-72
  4. Algebraic Cryptanalysis and Stream Cipher

    1. Jeremy Erickson, Jintai Ding, Chris Christensen
      Pages 73-86
    2. Mohamed Saied Emam Mohamed, Daniel Cabarcas, Jintai Ding, Johannes Buchmann, Stanislav Bulygin
      Pages 87-100
    3. Joo Yeon Cho, Miia Hermelin
      Pages 101-117
  5. Security Management and Efficient Implementation

    1. Aivo Jürgenson, Jan Willemson
      Pages 118-128
    2. Axel Poschmann, Matt Robshaw, Frank Vater, Christof Paar
      Pages 129-145
  6. Side Channel Attack

    1. Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Christof Paar
      Pages 146-160
    2. Abdulhadi Shoufan, Falko Strenzke, H. Gregor Molter, Marc Stöttinger
      Pages 161-175
    3. Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall
      Pages 176-192
  7. Privacy Enhanced Technology

    1. Qingsong Ye, Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
      Pages 211-228
    2. Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
      Pages 229-244
  8. Cryptographic Protocol

    1. Tord Reistad, Tomas Toft
      Pages 245-257
    2. Nikita Borisov, Marek Klonowski, Mirosław Kutyłowski, Anna Lauks-Dutka
      Pages 258-273
    3. Alessandro Sorniotti, Refik Molva
      Pages 274-299
  9. Cryptanalysis of Hash Function

    1. Shuang Wu, Dengguo Feng, Wenling Wu
      Pages 300-314
    2. Deukjo Hong, Bonwook Koo, Woo-Hwan Kim, Daesung Kwon
      Pages 315-331
    3. Deukjo Hong, Bonwook Koo, Yu Sasaki
      Pages 332-348
    4. Siyuan Qiao, Wei Wang, Keting Jia
      Pages 349-361
  10. Network Security

    1. Madeline González Muñiz, Rainer Steinwandt
      Pages 362-373
  11. Back Matter

About these proceedings


ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 2–4, 2009. It was - ganized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS). The aim of this conference was to provide a forum for the presentation of new results in research, development, and applications in the ?eld of information security and cryptology. It also served as a place for research information exchange. The conference received 88 submissions from 22 countries, covering all areas of inf- mation security and cryptology. The review and selection processes were carried out in two stages by the Program Committee (PC) comprising 57 prominent - searchers via online meetings. First, at least three PC members blind-reviewed each paper, and papers co-authored by the PC members were reviewed by at least ?ve PC members. Second, individual review reports were revealed to PC members, and detailed interactive discussion on each paper followed. Through this process,thePC?nally selected 25papers from15countries. The acceptance rate was 28. 4%. The authors of selected papers had a few weeks to prepare for their ?nal versions based on the comments received from more than 80 ext- nal reviewers. The conference featured one tutorial and one invited talk. The tutorial was given by Amit Sahai from the University of California and the talk ´ was given by Michel Abdalla from Ecole normale sup´ erieure.


ARIRANG access control algorithms calculus cryptanalysis cryptographic protocols cryptography cryptosystems hash function repair

Editors and affiliations

  • Donghoon Lee
    • 1
  • Seokhie Hong
    • 2
  1. 1.CIST (Center for Information Security Technologies)Korea University Anam Dong, Sungbuk GuSeoulKorea
  2. 2.Center for Information Security Technologies(CIST)Korea UniversitySeoulKorea

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-14422-6
  • Online ISBN 978-3-642-14423-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site