Advertisement

Information Security and Cryptology

5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers

  • Feng Bao
  • Moti Yung
  • Dongdai Lin
  • Jiwu Jing
Conference proceedings Inscrypt 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6151)

Table of contents

  1. Front Matter
  2. Cryptanalysis

    1. Ping Li, Bing Sun, Chao Li
      Pages 1-14
    2. Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan et al.
      Pages 15-34
    3. Zhiqiang Liu, Dawu Gu, Jing Zhang, Wei Li
      Pages 35-49
  3. Signature and Signcryption

    1. S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
      Pages 75-92
    2. Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan
      Pages 93-107
    3. S. Sharmila Deva Selvi, S. Sree Vivek, Shilpi Nayak, C. Pandu Rangan
      Pages 108-123
  4. Key Exchange

  5. Private Computations

    1. Yanjiang Yang, Jian Weng, Jianying Zhou, Ying Qiu
      Pages 164-178
    2. Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 179-197
  6. Cipher Design and Analysis

    1. Ruming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang
      Pages 198-214
    2. Lei Zhang, Wenling Wu, Liting Zhang
      Pages 215-229
    3. Muhammad Reza Z’aba, Leonie Simpson, Ed Dawson, Kenneth Wong
      Pages 248-265
    4. Jean-Charles Faugère, Ludovic Perret
      Pages 266-277
  7. Public Key Cryptography

    1. Xianmeng Meng, Jingguo Bi
      Pages 278-287
    2. Rui Zhang, Hideki Imai
      Pages 303-312
  8. Network and System Security

    1. Feng Cheng, Sebastian Roschke, Robert Schuppenies, Christoph Meinel
      Pages 324-336
    2. Elie Bursztein, John C. Mitchell
      Pages 337-349
  9. Hardware Security

    1. Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe
      Pages 383-392
    2. Mathieu Renauld, François-Xavier Standaert
      Pages 393-410
  10. Web Security

  11. Back Matter

About these proceedings

Keywords

access control authentication control cryptoanalysis cryptographic protocol cryptographic protocols cryptography cryptology digital signature digital signatures information security networks security security modeling trusted computing

Editors and affiliations

  • Feng Bao
    • 1
  • Moti Yung
    • 2
  • Dongdai Lin
    • 3
  • Jiwu Jing
    • 4
  1. 1.Institute for Infocomm ResearchSingapore
  2. 2.Google Inc. and Computer Science DepartmentColumbia UniversityNew YorkUSA
  3. 3.Institute of SoftwareSKLOIS, Chinese Academy of SciencesBeijingChina
  4. 4.SKLOIS, Graduate University of Chinese Academy of SciencesBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-16342-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-16341-8
  • Online ISBN 978-3-642-16342-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site