Information Security and Cryptology - ICISC 2011

14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers

  • Howon Kim

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7259)

Table of contents

  1. Front Matter
  2. Hash Function I

    1. Yu Sasaki, Kazumaro Aoki
      Pages 1-17
    2. Thorsten Ernst Schilling, Håvard Raddum
      Pages 18-32
    3. Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 33-47
  3. Side Channel Analysis I

    1. Hailong Zhang, Yongbin Zhou, Dengguo Feng
      Pages 61-73
    2. Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek, Jung Hee Cheon
      Pages 74-87
  4. Public Key Cryptography

    1. Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito
      Pages 88-108
    2. Song Luo, Qingni Shen, Zhong Chen
      Pages 109-126
  5. Network and Mobile Security

    1. Yong Qiao, Yuexiang Yang, Jie He, Bo Liu, Yingzhi Zeng
      Pages 127-139
  6. Digital Signature

    1. Juliane Krämer, Dmitry Nedospasov, Jean-Pierre Seifert
      Pages 155-168
  7. Side Channel Analysis II

    1. Haibo Tian, Xiaofeng Chen, Zhengtao Jiang, Yusong Du
      Pages 219-234
  8. Cryptanalysis

    1. Kyung Chul Jeong, Dong Hoon Lee, Daewan Han
      Pages 235-247
    2. Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang
      Pages 248-260
    3. Yusong Du, Fangguo Zhang, Meicheng Liu
      Pages 261-274

About these proceedings

Introduction

This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol.

Keywords

PKZIP encryption cloud computing denial of service resistance oblivious transfer zero day vulnerability

Editors and affiliations

  • Howon Kim
    • 1
  1. 1.(A06) 6503 School of Computer Science and EngineeringPusan National UniversityGeumJeong-GuSouth Korea

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-31912-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-31911-2
  • Online ISBN 978-3-642-31912-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering