Skip to main content

Information Security and Cryptology -- ICISC 2013

16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers

  • Conference proceedings
  • © 2014

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8565)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ICISC 2013.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (31 papers)

  1. Secure Multiparty Computation

  2. Proxy Re-encryption

  3. Side Channel Analysis and Its Countermeasures

  4. Cryptanalysis 1

  5. Cryptanalysis 2

  6. Embedded System Security and Its Implementation

Other volumes

  1. Information Security and Cryptology -- ICISC 2013

Keywords

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.

Editors and Affiliations

  • EWHA Womans University, Seoul, Korea, Republic of (South Korea)

    Hyang-Sook Lee

  • Kookmin University, Seoul, Korea, Republic of (South Korea)

    Dong-Guk Han

Bibliographic Information

Publish with us