Skip to main content
  • Conference proceedings
  • © 2013

Information Security and Cryptology -- ICISC 2012

15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7839)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

  2. Invited Papers

    1. ML Confidential: Machine Learning on Encrypted Data

      • Thore Graepel, Kristin Lauter, Michael Naehrig
      Pages 1-21
    2. Another Look at Affine-Padding RSA Signatures

      • Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
      Pages 22-32
  3. Attack and Defense

    1. Balanced Indexing Method for Efficient Intrusion Detection Systems

      • BooJoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im
      Pages 37-48
    2. Quantitative Questions on Attack–Defense Trees

      • Barbara Kordy, Sjouke Mauw, Patrick Schweitzer
      Pages 49-64
    3. DNS Tunneling for Network Penetration

      • Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux et al.
      Pages 65-77
    4. MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring

      • Lingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu
      Pages 78-91
  4. Software and Web Security

    1. iBinHunt: Binary Hunting with Inter-procedural Control Flow

      • Jiang Ming, Meng Pan, Debin Gao
      Pages 92-109
    2. Sometimes It’s Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys

      • Christopher Meyer, Florian Feldmann, Jörg Schwenk
      Pages 110-125
  5. Cryptanalysis I

    1. Improved Impossible Differential Attacks on Large-Block Rijndael

      • Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov
      Pages 126-140
    2. Cube Cryptanalysis of LBlock with Noisy Leakage

      • Zhenqi Li, Bin Zhang, Yuan Yao, Dongdai Lin
      Pages 141-155
    3. New Impossible Differential Attack on SAFER +  and SAFER + +

      • Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng
      Pages 170-183
  6. Cryptographic Protocol

    1. An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol

      • Christian L. F. Corniaux, Hossein Ghodosi
      Pages 184-201
    2. Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms

      • Koki Hamada, Ryo Kikuchi, Dai Ikarashi, Koji Chida, Katsumi Takahashi
      Pages 202-216
  7. Identity-Based Encryption

    1. A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles

      • Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang
      Pages 231-246
    2. Ciphertext Policy Multi-dimensional Range Encryption

      • Kohei Kasamatsu, Takahiro Matsuda, Goichiro Hanaoka, Hideki Imai
      Pages 247-261
  8. Efficient Implementation

    1. Speeding Up Ate Pairing Computation in Affine Coordinates

      • Duc-Phong Le, Chik How Tan
      Pages 262-277

Other Volumes

  1. Information Security and Cryptology – ICISC 2012

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.

Editors and Affiliations

  • Department of Computer Engineering, Sejong University, Seoul, Korea

    Taekyoung Kwon

  • School of Computer Science and Engineering, Inha University, Incheon, Korea

    Mun-Kyu Lee

  • National Security Research Institute, Daejeon, Korea

    Daesung Kwon

Bibliographic Information

  • Book Title: Information Security and Cryptology -- ICISC 2012

  • Book Subtitle: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

  • Editors: Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-37682-5

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2013

  • Softcover ISBN: 978-3-642-37681-8Published: 17 April 2013

  • eBook ISBN: 978-3-642-37682-5Published: 03 April 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 512

  • Number of Illustrations: 108 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access