Skip to main content
  • Conference proceedings
  • © 2011

Information Security and Cryptology

6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers

  • High quality selected papers
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6584)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology

Conference proceedings info: Inscrypt 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

  2. Encryption Schemes

    1. New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems

      • Lihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
      Pages 1-17
    2. Online/Offline Identity-Based Signcryption Revisited

      • Joseph K. Liu, Joonsang Baek, Jianying Zhou
      Pages 36-51
  3. Stream Ciphers, Sequences and Elliptic Curves

    1. An Efficient, Parameterized and Scalable S-box for Stream Ciphers

      • Sourav Das, Dipanwita RoyChowdhury
      Pages 77-94
    2. A Family of Binary Threshold Sequences Constructed by Using the Multiplicative Inverse

      • Zhixiong Chen, Xiangguo Cheng, Chenhuang Wu
      Pages 95-104
    3. A Generalization of Verheul’s Theorem for Some Ordinary Curves

      • Zhi Hu, Maozhi Xu, Zhenghua Zhou
      Pages 105-114
  4. Hash Functions

    1. Variants of Multicollision Attacks on Iterated Hash Functions

      • Tuomas Kortelainen, Juha Kortelainen, Kimmo Halunen
      Pages 139-154
    2. Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher

      • Shuang Wu, Dengguo Feng, Wenling Wu, Bozhan Su
      Pages 155-168
    3. Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160

      • Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama
      Pages 169-186
    4. Pseudo-Cryptanalysis of Luffa

      • Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang
      Pages 187-198

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010.
The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.

Editors and Affiliations

  • Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China

    Xuejia Lai

  • Columbia University, USA

    Moti Yung

  • State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, China

    Dongdai Lin

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access