Skip to main content
  • Conference proceedings
  • © 2010

Information Security and Cryptology - ICISC 2009

12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5984)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Key Management and Key Exchange

    1. Generic One Round Group Key Exchange in the Standard Model

      • M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis
      Pages 1-15
    2. Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange

      • Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu
      Pages 16-33
    3. Efficient Certificateless KEM in the Standard Model

      • Georg Lippold, Colin Boyd, Juan Manuel González Nieto
      Pages 34-46
  3. Public Key Cryptography

    1. Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing

      • Yumi Sakemi, Shoichi Takeuchi, Yasuyuki Nogami, Yoshitaka Morikawa
      Pages 47-64
    2. Factoring Unbalanced Moduli with Known Bits

      • Eric Brier, David Naccache, Mehdi Tibouchi
      Pages 65-72
  4. Algebraic Cryptanalysis and Stream Cipher

    1. Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared

      • Jeremy Erickson, Jintai Ding, Chris Christensen
      Pages 73-86
    2. MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals

      • Mohamed Saied Emam Mohamed, Daniel Cabarcas, Jintai Ding, Johannes Buchmann, Stanislav Bulygin
      Pages 87-100
    3. Improved Linear Cryptanalysis of SOSEMANUK

      • Joo Yeon Cho, Miia Hermelin
      Pages 101-117
  5. Security Management and Efficient Implementation

    1. Serial Model for Attack Tree Computations

      • Aivo Jürgenson, Jan Willemson
      Pages 118-128
    2. Lightweight Cryptography and RFID: Tackling the Hidden Overheads

      • Axel Poschmann, Matt Robshaw, Frank Vater, Christof Paar
      Pages 129-145
  6. Side Channel Attack

    1. Power Analysis of Single-Rail Storage Elements as Used in MDPL

      • Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Christof Paar
      Pages 146-160
    2. A Timing Attack against Patterson Algorithm in the McEliece PKC

      • Abdulhadi Shoufan, Falko Strenzke, H. Gregor Molter, Marc Stöttinger
      Pages 161-175
    3. Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications

      • Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall
      Pages 176-192
  7. Privacy Enhanced Technology

    1. Efficient Fuzzy Matching and Intersection on Private Datasets

      • Qingsong Ye, Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
      Pages 211-228
    2. Efficient Privacy-Preserving Face Recognition

      • Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
      Pages 229-244
  8. Cryptographic Protocol

    1. Linear, Constant-Rounds Bit-Decomposition

      • Tord Reistad, Tomas Toft
      Pages 245-257
    2. Attacking and Repairing the Improved ModOnions Protocol

      • Nikita Borisov, Marek Klonowski, Mirosław Kutyłowski, Anna Lauks-Dutka
      Pages 258-273
    3. Secret Handshakes with Revocation Support

      • Alessandro Sorniotti, Refik Molva
      Pages 274-299

Other Volumes

  1. Information, Security and Cryptology – ICISC 2009

About this book

ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 2–4, 2009. It was - ganized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS). The aim of this conference was to provide a forum for the presentation of new results in research, development, and applications in the ?eld of information security and cryptology. It also served as a place for research information exchange. The conference received 88 submissions from 22 countries, covering all areas of inf- mation security and cryptology. The review and selection processes were carried out in two stages by the Program Committee (PC) comprising 57 prominent - searchers via online meetings. First, at least three PC members blind-reviewed each paper, and papers co-authored by the PC members were reviewed by at least ?ve PC members. Second, individual review reports were revealed to PC members, and detailed interactive discussion on each paper followed. Through this process,thePC?nally selected 25papers from15countries. The acceptance rate was 28. 4%. The authors of selected papers had a few weeks to prepare for their ?nal versions based on the comments received from more than 80 ext- nal reviewers. The conference featured one tutorial and one invited talk. The tutorial was given by Amit Sahai from the University of California and the talk ´ was given by Michel Abdalla from Ecole normale sup´ erieure.

Editors and Affiliations

  • CIST (Center for Information Security Technologies), Korea University Anam Dong, Sungbuk Gu, Seoul, Korea

    Donghoon Lee

  • Center for Information Security Technologies(CIST), Korea University, Seoul, Korea

    Seokhie Hong

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access