About these proceedings
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.
Anonymity Authentication Block cipher Cryptanalysis Cryptographic application Cryptographic primitive Elliptic curve cryptography Encryption Hash function Lattice cryptography Meet in the middle Multiparty computation Obfuscation Oblivious transfer Outsource computation Privacy Public key cryptography Security protocols Signature protocols zero knowledge