Information Security and Cryptology – ICISC 2008

11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers

  • Pil Joong Lee
  • Jung Hee Cheon
Conference proceedings ICISC 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5461)

Table of contents

  1. Front Matter
  2. Public Key Encryption

    1. Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
      Pages 1-19
    2. Sascha Müller, Stefan Katzenbeisser, Claudia Eckert
      Pages 20-36
    3. Reo Yoshida, Katsuyuki Takashima
      Pages 52-65
  3. Key Management and Secret Sharing

  4. Privacy and Digital Rights

    1. Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira
      Pages 98-115
    2. Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili
      Pages 116-133
    3. Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara
      Pages 134-151
    4. Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet, Koen De Bosschere
      Pages 152-165
  5. Digital Signature and Voting

    1. Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee
      Pages 166-183
    2. Pairat Thorncharoensri, Willy Susilo, Yi Mu
      Pages 184-201
  6. Side Channel Attack

  7. Hash and MAC

    1. Liting Zhang, Wenling Wu, Peng Wang
      Pages 286-301
    2. Yu Sasaki, Kazumaro Aoki
      Pages 302-317
  8. Primitives and Foundations

  9. Block and Stream

  10. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008.

The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.


Public Key access control algebraic attack anonymity authentication collision copyright protection cryptanalysis cryptographic primitives cryptology cryptosystems data security information privacy

Editors and affiliations

  • Pil Joong Lee
    • 1
  • Jung Hee Cheon
    • 2
  1. 1.Department of Electronic and Electrical EngineeringPohang University of Science and Technology (POSTECH)PohangKorea
  2. 2.Department of Mathematical SciencesSeoul National UniversitySeoulKorea

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-00729-3
  • Online ISBN 978-3-642-00730-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software