Advertisement

Information Security and Cryptology - ICISC 2011

14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers

  • Howon Kim

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7259)

Table of contents

  1. Front Matter
  2. Hash Function I

    1. Yu Sasaki, Kazumaro Aoki
      Pages 1-17
    2. Thorsten Ernst Schilling, Håvard Raddum
      Pages 18-32
    3. Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 33-47
  3. Side Channel Analysis I

    1. Hailong Zhang, Yongbin Zhou, Dengguo Feng
      Pages 61-73
    2. Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek, Jung Hee Cheon
      Pages 74-87
  4. Public Key Cryptography

    1. Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito
      Pages 88-108
    2. Song Luo, Qingni Shen, Zhong Chen
      Pages 109-126
  5. Network and Mobile Security

    1. Yong Qiao, Yuexiang Yang, Jie He, Bo Liu, Yingzhi Zeng
      Pages 127-139
  6. Digital Signature

    1. Juliane Krämer, Dmitry Nedospasov, Jean-Pierre Seifert
      Pages 155-168
  7. Side Channel Analysis II

    1. Haibo Tian, Xiaofeng Chen, Zhengtao Jiang, Yusong Du
      Pages 219-234
  8. Cryptanalysis

    1. Kyung Chul Jeong, Dong Hoon Lee, Daewan Han
      Pages 235-247
    2. Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang
      Pages 248-260
    3. Yusong Du, Fangguo Zhang, Meicheng Liu
      Pages 261-274
  9. Efficient Implementation

    1. Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Gonzalez Nieto
      Pages 319-331
  10. Hash Function II

    1. Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
      Pages 346-364
    2. Deukjo Hong, Bonwook Koo, Daesung Kwon
      Pages 365-374
    3. Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su, Le Dong
      Pages 375-390
  11. Cryptographic Application

    1. Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
      Pages 391-405
    2. Fangming Zhao, Takashi Nishide, Kouichi Sakurai
      Pages 406-418
    3. Zhenfei Zhang, Thomas Plantard, Willy Susilo
      Pages 419-436
  12. Cryptographic Protocol

  13. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol.

Keywords

PKZIP encryption cloud computing denial of service resistance oblivious transfer zero day vulnerability

Editors and affiliations

  • Howon Kim
    • 1
  1. 1.(A06) 6503 School of Computer Science and EngineeringPusan National UniversityGeumJeong-GuSouth Korea

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-31912-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-31911-2
  • Online ISBN 978-3-642-31912-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site