Advances in Information and Computer Security

7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings

  • Goichiro Hanaoka
  • Toshihiro Yamauchi
Conference proceedings IWSEC 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7631)

Table of contents

  1. Front Matter
  2. Implementation

    1. Yiming Jing, Gail-Joon Ahn, Hongxin Hu
      Pages 1-18
    2. Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai
      Pages 19-36
    3. Chien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling, Axel Poschmann, Sirote Saetang
      Pages 37-50
    4. Kenta Nekado, Yasuyuki Nogami, Kengo Iokibe
      Pages 51-68
  3. Encryption and Key Exchange

    1. S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
      Pages 87-104
    2. Geong Sen Poh, Moesfa Soeheila Mohamad, Muhammad Reza Z’aba
      Pages 105-122
    3. Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka
      Pages 123-137
  4. Cryptanalysis

    1. Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii
      Pages 138-155
    2. Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta
      Pages 156-169
    3. Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
      Pages 170-181
    4. Jingjing Wang, Kefei Chen, Shixiong Zhu
      Pages 182-196
    5. Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque
      Pages 197-215
  5. Secure Protocols

    1. Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
      Pages 216-232
    2. Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang
      Pages 233-243
    3. Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
      Pages 244-260
  6. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols.

Keywords

elliptic curve cryptography hash function privacy preserving random oracle model symmetric-key encryption

Editors and affiliations

  • Goichiro Hanaoka
    • 1
  • Toshihiro Yamauchi
    • 2
  1. 1.Research Institute for Secure Systems (RISEC)National Institute of Advanced Industrial Science and Technology (AIST)TsukubaJapan
  2. 2.Graduate School of Natural Science and TechnologyOkayama UniversityOkayamaJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-34117-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34116-8
  • Online ISBN 978-3-642-34117-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book