Skip to main content
  • Conference proceedings
  • © 2011

Information Security Applications

11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6513)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Cryptosystem

    1. Construction of Identity Based Signcryption Schemes

      • Sumit Kumar Pandey, Rana Barua
      Pages 1-14
    2. Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage

      • Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama
      Pages 15-30
    3. A New Efficient Construction for Non-Malleable Zero-Knowledge Sets

      • Wenpan Jing, Haixia Xu, Bao Li
      Pages 31-43
    4. Distributed Paillier Cryptosystem without Trusted Dealer

      • Takashi Nishide, Kouichi Sakurai
      Pages 44-60
  3. Implementation

    1. Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs

      • Boufeldja Allailou, Abdelaziz Marjane, Abdellah Mokrane
      Pages 76-91
    2. Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices

      • Erich Wenger, Martin Feldhofer, Norbert Felber
      Pages 92-106
    3. A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling

      • Takehiko Amaki, Masanori Hashimoto, Yukio Mitsuyama, Takao Onoye
      Pages 107-121
  4. Mobile Security/Secure Coding

    1. An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6

      • Jae-hoon Jang, Don-Gu Yeo, Dong-hee Lee, Heung-Youl Youm
      Pages 150-159
    2. Hidden Credential Retrieval without Random Oracles

      • Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi
      Pages 160-174
  5. Attack

    1. Combined Side-Channel Attacks

      • M. Abdelaziz Elaabid, Olivier Meynard, Sylvain Guilley, Jean-Luc Danger
      Pages 175-190
    2. Correlation Power Analysis Based on Switching Glitch Model

      • Hongying Liu, Guoyu Qian, Satoshi Goto, Yukiyasu Tsunoo
      Pages 191-205
    3. Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity

      • Nico Döttling, Dejan Lazich, Jörn Müller-Quade, Antonio Sobreira de Almeida
      Pages 206-220
    4. Full-Round Differential Attack on TWIS Block Cipher

      • Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li
      Pages 234-242
    5. Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations

      • Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall
      Pages 243-257
    6. Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis

      • Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, Kazuo Ohta
      Pages 258-272

Other Volumes

  1. Information Security Applications

About this book

This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010. The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.

Editors and Affiliations

  • Department of Computer and Information Science, Korea University, Chungnam-do, Korea

    Yongwha Chung

  • Computer Science Department, Google Inc. and Columbia University, NewYork, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access