Advertisement

Information Security and Cryptology - ICISC 2010

13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers

  • Kyung-Hyune Rhee
  • DaeHun Nyang
Conference proceedings ICISC 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6829)

Table of contents

  1. Front Matter
  2. Cryptanalysis

    1. Ivica Nikolić, Josef Pieprzyk, Przemysław Sokołowski, Ron Steinfeld
      Pages 29-48
    2. Bonwook Koo, Deukjo Hong, Daesung Kwon
      Pages 49-67
    3. Yu Sasaki, Florian Mendel, Kazumaro Aoki
      Pages 68-91
  3. Cryptographic Algorithms

    1. Sébastien Canard, Iwen Coisel, Giacomo De Meulenaer, Olivier Pereira
      Pages 133-150
    2. Shoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida
      Pages 151-168
  4. Implementation

    1. Haihua Gu, Dawu Gu, WenLu Xie
      Pages 169-176
    2. Michael Weiner, Erik Tews, Benedikt Heinz, Johann Heyszl
      Pages 177-188
    3. Timo Kasper, Ingo von Maurich, David Oswald, Christof Paar
      Pages 189-206
  5. Network and Mobile Security

    1. Zhi Wang, Renquan Cheng, Debin Gao
      Pages 207-221
    2. Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis
      Pages 222-232
    3. Ambarish Karole, Nitesh Saxena, Nicolas Christin
      Pages 233-251
    4. Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, Angelos Keromytis
      Pages 252-265
  6. Symmetric Key Cryptography

    1. Mohamed Karroumi
      Pages 278-291
    2. Qichun Wang, Thomas Johansson
      Pages 311-324
  7. Cryptographic Protocols

    1. Christian L. F. Corniaux, Hossein Ghodosi
      Pages 338-354
    2. Lingling Xu, Fangguo Zhang
      Pages 370-395
  8. Side Channel Attack

    1. Jörn-Marc Schmidt, Marcel Medwed
      Pages 396-406
    2. Youssef Souissi, Maxime Nassar, Sylvain Guilley, Jean-Luc Danger, Florent Flament
      Pages 407-419
    3. Junko Takahashi, Toshinori Fukunaga, Kazuo Sakiyama
      Pages 420-434
  9. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.

Keywords

authenticated encryption elliptic curve payment systems secure message transmission software exploit

Editors and affiliations

  • Kyung-Hyune Rhee
    • 1
  • DaeHun Nyang
    • 2
  1. 1.Department of IT Convergence Application EngineeringPukyong National UniversityBusanRepublic of Korea
  2. 2.Department of Computer Science and Information TechnologyINHA UniversityIncheonRepublic of Korea

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-24209-0
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-24208-3
  • Online ISBN 978-3-642-24209-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site