Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5461)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ICISC: International Conference on Information Security and Cryptology
Conference proceedings info: ICISC 2008.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (26 papers)
-
Front Matter
-
Public Key Encryption
-
Side Channel Attack
About this book
Keywords
- Public Key
- access control
- algebraic attack
- anonymity
- authentication
- collision
- copyright protection
- cryptanalysis
- cryptographic primitives
- cryptology
- cryptosystems
- data security
- information
- privacy
- algorithm analysis and problem complexity
Editors and Affiliations
-
Department of Electronic and Electrical Engineering, Pohang University of Science and Technology (POSTECH), Pohang, Korea
Pil Joong Lee
-
Department of Mathematical Sciences, Seoul National University, Seoul, Korea
Jung Hee Cheon
Bibliographic Information
Book Title: Information Security and Cryptoloy - ICISC 2008
Book Subtitle: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
Editors: Pil Joong Lee, Jung Hee Cheon
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-00730-9
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2009
Softcover ISBN: 978-3-642-00729-3Published: 26 March 2009
eBook ISBN: 978-3-642-00730-9Published: 18 March 2009
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 433
Topics: Cryptology, Coding and Information Theory, Discrete Mathematics in Computer Science, Data and Information Security, IT Operations, Algorithms