About these proceedings
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.
AES Application Plagiarism Ciphers Cryptanalysis Cryptographic Protocols Data Hiding Digital Watermarking Embedded Systems Fault Analysis Fingerprint Formal Methods Hash Functions Oblivious Transfer Phishing Post-Quantum Cryptography Provable Security Public-Key Cryptography Security Model Side-Channel Analysis Social Network Security