Information Security and Cryptology – ICISC 2012

15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

  • Taekyoung Kwon
  • Mun-Kyu Lee
  • Daesung Kwon

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7839)

Table of contents

  1. Front Matter
  2. Invited Papers

    1. Thore Graepel, Kristin Lauter, Michael Naehrig
      Pages 1-21
    2. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
      Pages 22-32
  3. Attack and Defense

    1. BooJoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im
      Pages 37-48
    2. Barbara Kordy, Sjouke Mauw, Patrick Schweitzer
      Pages 49-64
    3. Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux et al.
      Pages 65-77
    4. Lingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu
      Pages 78-91
  4. Software and Web Security

    1. Jiang Ming, Meng Pan, Debin Gao
      Pages 92-109
    2. Christopher Meyer, Florian Feldmann, Jörg Schwenk
      Pages 110-125
  5. Cryptanalysis I

    1. Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov
      Pages 126-140
    2. Zhenqi Li, Bin Zhang, Yuan Yao, Dongdai Lin
      Pages 141-155
    3. Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng
      Pages 170-183
  6. Cryptographic Protocol

  7. Identity-Based Encryption

    1. Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang
      Pages 231-246
    2. Kohei Kasamatsu, Takahiro Matsuda, Goichiro Hanaoka, Hideki Imai
      Pages 247-261
  8. Efficient Implementation

    1. Duc-Phong Le, Chik How Tan
      Pages 262-277
    2. Shohreh Sharif Mansouri, Elena Dubrova
      Pages 278-292
    3. Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay
      Pages 293-308
  9. Cloud Computing Security

    1. Nicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius
      Pages 309-323
  10. Cryptanalysis II

  11. Side Channel Analysis

    1. Yongdae Kim, Naofumi Homma, Takafumi Aoki, Heebong Choi
      Pages 383-394
    2. Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama
      Pages 395-409
  12. Digital Signature

    1. Laila El Aimani, Olivier Sanders
      Pages 410-424
    2. Keisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, Tsuyoshi Takagi
      Pages 425-440
    3. Albrecht Petzoldt, Stanislav Bulygin
      Pages 441-455
    4. Sanjit Chatterjee, Chethan Kamath, Vikas Kumar
      Pages 456-471
  13. Privacy Enhancement

    1. Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
      Pages 472-486
  14. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.


ciphers cryptographic keys differential attack identity-based signature intrusion detection

Editors and affiliations

  • Taekyoung Kwon
    • 1
  • Mun-Kyu Lee
    • 2
  • Daesung Kwon
    • 3
  1. 1.Department of Computer EngineeringSejong UniversitySeoulKorea
  2. 2.School of Computer Science and EngineeringInha UniversityIncheonKorea
  3. 3.National Security Research InstituteDaejeonKorea

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-37681-8
  • Online ISBN 978-3-642-37682-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site