Skip to main content
  • Conference proceedings
  • © 2008

Information Security and Cryptology

Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4990)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology

Conference proceedings info: Inscrypt 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (41 papers)

  1. Front Matter

  2. Invited Talks

    1. Cryptanalysis of the SFLASH Signature Scheme

      • Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
      Pages 1-4
  3. Digital Signature Schemes

    1. An Efficient ID-Based Proxy Signature Scheme from Pairings

      • Chunxiang Gu, Yuefei Zhu
      Pages 40-50
  4. Block Cipher

    1. Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent

      • B. Collard, F. -X. Standaert, J. -J. Quisquater
      Pages 51-65
  5. Key Management

    1. A Key Predistribution Scheme Based on 3-Designs

      • Junwu Dong, Dingyi Pei, Xueli Wang
      Pages 81-92
    2. A Provably Secure One-Pass Two-Party Key Establishment Protocol

      • K. Chalkias, S. T. Halkidis, D. Hristu-Varsakelis, G. Stephanides, A. Alexiadis
      Pages 108-122
  6. Secret Sharing

    1. Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures

      • Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
      Pages 167-181
    2. Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images

      • Daoshun Wang, Xiaobo Li, Feng Yi
      Pages 192-200
  7. Stream Cipher and Pseudorandomness

    1. Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks

      • Sultan Al Hinai, Lynn Margaret Batten, Bernard Colbert
      Pages 201-215
    2. Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves

      • Zhixiong Chen, Ning Zhang, Guozhen Xiao
      Pages 231-245

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007.

The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access