Advertisement

Information Security and Cryptology

6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers

  • Xuejia Lai
  • Moti Yung
  • Dongdai Lin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6584)

Table of contents

  1. Front Matter
  2. Encryption Schemes

    1. Lihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
      Pages 1-17
    2. Joseph K. Liu, Joonsang Baek, Jianying Zhou
      Pages 36-51
  3. Stream Ciphers, Sequences and Elliptic Curves

  4. Secure Computing

  5. Hash Functions

    1. Tuomas Kortelainen, Juha Kortelainen, Kimmo Halunen
      Pages 139-154
    2. Shuang Wu, Dengguo Feng, Wenling Wu, Bozhan Su
      Pages 155-168
    3. Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama
      Pages 169-186
    4. Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang
      Pages 187-198
  6. Key Management

  7. Digital Signatures

    1. Junqing Gong, Haifeng Qian, Yuan Zhou
      Pages 300-317
    2. Kazuki Yoneyama, Mebae Ushida, Kazuo Ohta
      Pages 318-335
    3. Paulo S. L. M. Barreto, Pierre-Louis Cayrel, Rafael Misoczki, Robert Niebuhr
      Pages 336-349
    4. Yilian Zhang, Zhide Chen, Fuchun Guo
      Pages 350-358
  8. Privacy and Algebraic Cryptanalysis

    1. Rui Zhang
      Pages 359-372
    2. Łukasz Krzywiecki, Mirosław Kutyłowski, Hubert Misztela, Tomasz Strumiński
      Pages 373-386
    3. Martin Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret
      Pages 387-403
    4. Qichun Wang, Thomas Johansson
      Pages 404-414
  9. Hashing and Authentication

    1. Xiaofeng Chen, Haibo Tian, Fangguo Zhang, Yong Ding
      Pages 415-426
    2. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Raphael C. -W. Phan, Juan M. E. Tapiador, Tieyan Li
      Pages 427-442
  10. Hardware and Software Issues

    1. Olivier Meynard, Denis Réal, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Frédéric Valette
      Pages 471-486
    2. Ning Ding, Dawu Gu
      Pages 487-502
    3. Yang Yi, Ying Lingyun, Wang Rui, Su Purui, Feng Dengguo
      Pages 503-522
  11. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010.
The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.

Keywords

S-box authentication cryptography oblivious transfer public-key encryption

Editors and affiliations

  • Xuejia Lai
    • 1
  • Moti Yung
    • 2
  • Dongdai Lin
    • 3
  1. 1.Department of Computer Science and EngineeringShanghai Jiaotong UniversityShanghaiChina
  2. 2.Columbia UniversityUSA
  3. 3.State Key Laboratory of Information Security, Institute of SoftwareChinese Academy of SciencesBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-21518-6
  • Copyright Information Springer Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-21517-9
  • Online ISBN 978-3-642-21518-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site