Information Security and Cryptology

8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers

  • Mirosław Kutyłowski
  • Moti Yung
Conference proceedings Inscrypt 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7763)

Table of contents

  1. Front Matter
  2. Sk Subidh Ali, Debdeep Mukhopadhyay
    Pages 10-28
  3. Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, Huaxiong Wang
    Pages 29-45
  4. Yang Li, Kazuo Ohta, Kazuo Sakiyama
    Pages 46-59
  5. Jintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou
    Pages 60-68
  6. Teng Guo, Feng Liu, ChuanKun Wu
    Pages 90-101
  7. Yuan Chen, Qingkuan Dong
    Pages 102-121
  8. Moesfa Soeheila Mohamad, Geong Sen Poh
    Pages 137-156
  9. Shlomi Dolev, Nova Fandina, Ximing Li
    Pages 157-174
  10. Michael Walter, Stanislav Bulygin, Johannes Buchmann
    Pages 175-197
  11. Harry Bartlett, Mufeed AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong
    Pages 198-215
  12. Zhelei Sun, Peng Wang, Liting Zhang
    Pages 216-224
  13. Risto M. Hakala, Atle Kivelä, Kaisa Nyberg
    Pages 246-262
  14. Tao Shi, Vladimir Anashin, Dongdai Lin
    Pages 263-275
  15. Yuxin Meng, Duncan S. Wong, Roman Schlegel, Lam-for Kwok
    Pages 331-350
  16. Mehdi Khalfaoui, Refik Molva, Laurent Gomez
    Pages 351-370
  17. Aslı Bay, Ioana Boureanu, Aikaterini Mitrokotsa, Iosif Spulber, Serge Vaudenay
    Pages 371-391
  18. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012.
The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.


algebraic cryptanalysis authentication linear attacks security protocols visual cryptography

Editors and affiliations

  • Mirosław Kutyłowski
    • 1
  • Moti Yung
    • 2
  1. 1.Department of Fundamental Problems of TechnologyWrocław University of TechnologyWrocławPoland
  2. 2.Computer Science DepartmentColumbia University and Google Inc.New YorkUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-38518-6
  • Online ISBN 978-3-642-38519-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment