Information Security and Cryptology – ICISC 2012

15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

  • Taekyoung Kwon
  • Mun-Kyu Lee
  • Daesung Kwon

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7839)

Table of contents

  1. Front Matter
  2. Invited Papers

    1. Thore Graepel, Kristin Lauter, Michael Naehrig
      Pages 1-21
    2. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
      Pages 22-32
  3. Attack and Defense

    1. BooJoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im
      Pages 37-48
    2. Barbara Kordy, Sjouke Mauw, Patrick Schweitzer
      Pages 49-64
    3. Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux et al.
      Pages 65-77
    4. Lingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu
      Pages 78-91
  4. Software and Web Security

    1. Jiang Ming, Meng Pan, Debin Gao
      Pages 92-109
    2. Christopher Meyer, Florian Feldmann, Jörg Schwenk
      Pages 110-125
  5. Cryptanalysis I

    1. Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov
      Pages 126-140
    2. Zhenqi Li, Bin Zhang, Yuan Yao, Dongdai Lin
      Pages 141-155
    3. Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng
      Pages 170-183
  6. Cryptographic Protocol

  7. Identity-Based Encryption

    1. Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang
      Pages 231-246
    2. Kohei Kasamatsu, Takahiro Matsuda, Goichiro Hanaoka, Hideki Imai
      Pages 247-261
  8. Efficient Implementation

    1. Duc-Phong Le, Chik How Tan
      Pages 262-277

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.

Keywords

ciphers cryptographic keys differential attack identity-based signature intrusion detection

Editors and affiliations

  • Taekyoung Kwon
    • 1
  • Mun-Kyu Lee
    • 2
  • Daesung Kwon
    • 3
  1. 1.Department of Computer EngineeringSejong UniversitySeoulKorea
  2. 2.School of Computer Science and EngineeringInha UniversityIncheonKorea
  3. 3.National Security Research InstituteDaejeonKorea

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-37682-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-37681-8
  • Online ISBN 978-3-642-37682-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book