Advertisement

Information Security and Cryptology - ICISC 2015

18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers

  • Soonhak Kwon
  • Aaram Yun
Conference proceedings ICISC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9558)

Also part of the Security and Cryptology book sub series (LNSC, volume 9558)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Digital Signatures

    1. Front Matter
      Pages 1-1
    2. David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
      Pages 3-19
    3. Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata
      Pages 20-35
    4. Hiroaki Anada, Seiko Arita, Kouichi Sakurai
      Pages 36-49
  3. Public-Key Cryptography

    1. Front Matter
      Pages 51-51
    2. Benjamin Wesolowski, Pascal Junod
      Pages 53-68
    3. Özgür Dagdelen, Sebastian Gajek, Florian Göpfert
      Pages 69-84
  4. Block Cipher Cryptanalysis

    1. Front Matter
      Pages 85-85
    2. Christoph Dobraunig, Maria Eichlseder, Florian Mendel
      Pages 87-101
    3. Huiling Zhang, Wenling Wu, Yanfeng Wang
      Pages 102-118
    4. Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya
      Pages 119-135
    5. Ning Wang, Xiaoyun Wang, Keting Jia
      Pages 136-152
  5. Elliptic Curve Cryptography

    1. Front Matter
      Pages 153-153
    2. Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou et al.
      Pages 169-181
  6. Protocols

    1. Front Matter
      Pages 183-183
    2. Donghoon Chang, Amit Kumar Chauhan, Muhammed Noufal K, Jinkeon Kang
      Pages 194-209
    3. Seth Gilbert, Xiao Liu, Haifeng Yu
      Pages 210-226
  7. Security

    1. Front Matter
      Pages 227-227
    2. Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng et al.
      Pages 229-245
    3. Maksim O. Shudrak, Vyacheslav V. Zolotarev
      Pages 246-261
    4. Julian Vetter, Matthias Junker-Petschick, Jan Nordholz, Michael Peter, Janis Danisevskis
      Pages 262-277
    5. Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
      Pages 278-293
  8. Side-Channel Attacks

    1. Front Matter
      Pages 295-295
    2. Weiqiong Cao, Jingyi Feng, Hua Chen, Shaofeng Zhu, Wenling Wu, Xucang Han et al.
      Pages 297-313
    3. Tomoyuki Tanigaki, Noboru Kunihiro
      Pages 314-328
    4. HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim et al.
      Pages 329-342
  9. Physical Unclonable Functions

    1. Front Matter
      Pages 343-343
    2. Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
      Pages 345-358
    3. Łukasz Krzywiecki
      Pages 359-372
  10. Back Matter
    Pages 373-374

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security and Cryptology, ICISC 2015, held in Seoul, South Korea, in November 2015.

The 23 revised full papers presented were carefully selected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are grouped around the following topics: digital signatures; public-key cryptography; block cipher cryptanalysis; elliptic curve cryptography; protocols; security; side-channel attacks.

Keywords

cryptographic protocols hardware-based security protocols hash functionse public key (asymmetric) techniques symmetric cryptography AES ciphers cryptanalysis cryptanalysis and other attacks cryptographic primitives fingerprint formal methods hash functions malware and its mitigation oblivious transfer privacy-preserving protocols public-key cryptography security model side-channel analysis and countermeasures social network security

Editors and affiliations

  • Soonhak Kwon
    • 1
  • Aaram Yun
    • 2
  1. 1.Sungkyunkwan UniversitySuwon, GyeonggiKorea (Republic of)
  2. 2.UNISTUlsanKorea (Republic of)

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-30840-1
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-30839-5
  • Online ISBN 978-3-319-30840-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering