Advertisement

Information Security and Cryptology

Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

  • Editors
  • Dingyi Pei
  • Moti Yung
  • Dongdai Lin
  • Chuankun Wu
Conference proceedings Inscrypt 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4990)

Table of contents

  1. Front Matter
  2. Invited Talks

    1. Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
      Pages 1-4
  3. Digital Signature Schemes

  4. Block Cipher

    1. B. Collard, F. -X. Standaert, J. -J. Quisquater
      Pages 51-65
  5. Key Management

    1. Junwu Dong, Dingyi Pei, Xueli Wang
      Pages 81-92
    2. K. Chalkias, S. T. Halkidis, D. Hristu-Varsakelis, G. Stephanides, A. Alexiadis
      Pages 108-122
  6. Zero Knowledge and Secure Computation Protocols

  7. Secret Sharing

    1. Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
      Pages 167-181
    2. Daoshun Wang, Xiaobo Li, Feng Yi
      Pages 192-200
  8. Stream Cipher and Pseudorandomness

    1. Sultan Al Hinai, Lynn Margaret Batten, Bernard Colbert
      Pages 201-215
    2. Zhixiong Chen, Ning Zhang, Guozhen Xiao
      Pages 231-245
    3. Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis
      Pages 246-255
  9. Boolean Functions

  10. Privacy and Deniability

    1. Jacek Cichoń, Mirosław Kutyłowski
      Pages 283-297
    2. Shaoquan Jiang
      Pages 298-312
    3. Rui Zhang, Goichiro Hanaoka, Hideki Imai
      Pages 313-327
  11. Hash Functions

    1. Shiwei Chen, Chenhui Jin
      Pages 343-357
    2. Jintai Ding, Bo-Yin Yang
      Pages 358-371
  12. Public Key Cryptosystems

    1. Chunxiang Gu, Yuefei Zhu, Heng Pan
      Pages 372-383
    2. Fuchun Guo, Yi Mu, Zhide Chen, Li Xu
      Pages 384-398
  13. Public Key Analysis

    1. Xin Jiang, Jintai Ding, Lei Hu
      Pages 399-411
    2. Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai
      Pages 412-426
    3. Adam L. Young, Moti Yung
      Pages 427-441
  14. Application Security

    1. Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang, Zan Li, Kai Fan
      Pages 442-456
    2. Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin
      Pages 457-462
  15. Systems Security and Trusted Computing

    1. Jing Zhan, Huanguo Zhang, Fei Yan
      Pages 463-471
    2. Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau
      Pages 472-481
    3. Yang Xiang, Qiang Li
      Pages 482-496
  16. Network Security

  17. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007.

The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security.

Keywords

Boolean function Public Key Trusted Computing data security information privacy security trust

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-79499-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-79498-1
  • Online ISBN 978-3-540-79499-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site