Skip to main content
  • Conference proceedings
  • © 2013

Information Security and Cryptology

8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers

  • High quality selected papers
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7763)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology

Conference proceedings info: Inscrypt 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 papers)

  1. Front Matter

  2. Differential Fault Analysis of Twofish

    • Sk Subidh Ali, Debdeep Mukhopadhyay
    Pages 10-28
  3. Improved Differential Cache Attacks on SMS4

    • Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, Huaxiong Wang
    Pages 29-45
  4. An Extension of Fault Sensitivity Analysis Based on Clockwise Collision

    • Yang Li, Kazuo Ohta, Kazuo Sakiyama
    Pages 46-59
  5. A Robust Fuzzy Extractor without ECCs

    • Jintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou
    Pages 60-68
  6. Visual Cryptography for Natural Images and Visual Voting

    • Teng Guo, Feng Liu, ChuanKun Wu
    Pages 90-101
  7. RCCA Security for KEM+DEM Style Hybrid Encryptions

    • Yuan Chen, Qingkuan Dong
    Pages 102-121
  8. Verifiable Structured Encryption

    • Moesfa Soeheila Mohamad, Geong Sen Poh
    Pages 137-156
  9. Nested Merkle’s Puzzles against Sampling Attacks

    • Shlomi Dolev, Nova Fandina, Ximing Li
    Pages 157-174
  10. Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC

    • Michael Walter, Stanislav Bulygin, Johannes Buchmann
    Pages 175-197
  11. A General Model for MAC Generation Using Direct Injection

    • Harry Bartlett, Mufeed AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong
    Pages 198-215
  12. Collision Attacks on Variant of OCB Mode and Its Series

    • Zhelei Sun, Peng Wang, Liting Zhang
    Pages 216-224
  13. Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN

    • Risto M. Hakala, Atle Kivelä, Kaisa Nyberg
    Pages 246-262
  14. Fast Evaluation of T-Functions via Time-Memory Trade-Offs

    • Tao Shi, Vladimir Anashin, Dongdai Lin
    Pages 263-275

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012.
The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.

Editors and Affiliations

  • Department of Fundamental Problems of Technology, Wrocław University of Technology, Wrocław, Poland

    Mirosław Kutyłowski

  • Computer Science Department, Columbia University and Google Inc., New York, USA

    Moti Yung

Bibliographic Information

  • Book Title: Information Security and Cryptology

  • Book Subtitle: 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers

  • Editors: Mirosław Kutyłowski, Moti Yung

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-38519-3

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2013

  • Softcover ISBN: 978-3-642-38518-6Published: 14 May 2013

  • eBook ISBN: 978-3-642-38519-3Published: 13 November 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XII, 393

  • Number of Illustrations: 61 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Coding and Information Theory

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access