Skip to main content
  • Conference proceedings
  • © 2005

Information Security and Cryptology

First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3822)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CISC: International Conference on Information Security and Cryptology

Conference proceedings info: CISC 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

  2. Identity Based Cryptography

    1. ID-Based Signature Scheme Without Trusted PKG

      • Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong
      Pages 53-62
  3. Security Modelling

    1. Specifying Authentication Using Signal Events in CSP

      • Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
      Pages 63-74
    2. Modeling RFID Security

      • Xiaolan Zhang, Brian King
      Pages 75-90
  4. Systems Security

    1. Enforcing Email Addresses Privacy Using Tokens

      • Roman Schlegel, Serge Vaudenay
      Pages 91-100
  5. Signature Schemes

    1. Efficient Group Signatures from Bilinear Pairing

      • Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang
      Pages 128-139
    2. Constructing Secure Proxy Cryptosystem

      • Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
      Pages 150-161
  6. Symmetric Key Mechanisms

    1. Towards a General RC4-Like Keystream Generator

      • Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz
      Pages 162-174
    2. HCTR: A Variable-Input-Length Enciphering Mode

      • Peng Wang, Dengguo Feng, Wenling Wu
      Pages 175-188
    3. The kth-Order Quasi-Generalized Bent Functions over Ring Z p

      • Jihong Teng, Shiqu Li, Xiaoying Huang
      Pages 189-201
    4. A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences

      • Shimin Wei, Guolong Chen, Guozhen Xiao
      Pages 202-209
  7. Zero-Knowledge and Secure Computations

    1. An Improved Secure Two-Party Computation Protocol

      • Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
      Pages 221-232

Other Volumes

  1. Information Security and Cryptology

About this book

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer’s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.

Editors and Affiliations

  • State Key Laboratory of Information Security, Institution of Software of Chinese Academy of Sciences, Beijing, China

    Dengguo Feng

  • SKLOIS Lab, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China

    Dongdai Lin

  • Computer Science Department, Google Inc. and Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access