Skip to main content
  • Conference proceedings
  • © 2010

Information Security and Cryptology

5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers

  • Unique visibility
  • State-of-the-art research
  • Fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6151)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology

Conference proceedings info: Inscrypt 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. Cryptanalysis

    1. Integral Cryptanalysis of ARIA

      • Ping Li, Bing Sun, Chao Li
      Pages 1-14
    2. Cryptanalysis of the ESSENCE Family of Hash Functions

      • Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan et al.
      Pages 15-34
    3. Differential-Multiple Linear Cryptanalysis

      • Zhiqiang Liu, Dawu Gu, Jing Zhang, Wei Li
      Pages 35-49
  3. Signature and Signcryption

    1. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing

      • S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
      Pages 75-92
    2. Sanitizable Signatures with Strong Transparency in the Standard Model

      • Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan
      Pages 93-107
    3. Breaking and Building of Threshold Signcryption Schemes

      • S. Sharmila Deva Selvi, S. Sree Vivek, Shilpi Nayak, C. Pandu Rangan
      Pages 108-123
  4. Private Computations

    1. Optionally Identifiable Private Handshakes

      • Yanjiang Yang, Jian Weng, Jianying Zhou, Ying Qiu
      Pages 164-178
    2. Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience

      • Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 179-197
  5. Cipher Design and Analysis

    1. Gemstone: A New Stream Cipher Using Coupled Map Lattice

      • Ruming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang
      Pages 198-214
    2. Proposition of Two Cipher Structures

      • Lei Zhang, Wenling Wu, Liting Zhang
      Pages 215-229
    3. Linearity within the SMS4 Block Cipher

      • Muhammad Reza Z’aba, Leonie Simpson, Ed Dawson, Kenneth Wong
      Pages 248-265
    4. Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages

      • Jean-Charles Faugère, Ludovic Perret
      Pages 266-277

Editors and Affiliations

  • Institute for Infocomm Research, Singapore

    Feng Bao

  • Google Inc. and Computer Science Department, Columbia University, New York, USA

    Moti Yung

  • Institute of Software, SKLOIS, Chinese Academy of Sciences, Beijing, China

    Dongdai Lin

  • SKLOIS, Graduate University of Chinese Academy of Sciences, Beijing, China

    Jiwu Jing

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access