Skip to main content
  • Conference proceedings
  • © 2009

Information Security and Cryptoloy - ICISC 2008

11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5461)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Public Key Encryption

    1. Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption

      • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
      Pages 1-19
    2. Distributed Attribute-Based Encryption

      • Sascha Müller, Stefan Katzenbeisser, Claudia Eckert
      Pages 20-36
    3. Simple Algorithms for Computing a Sequence of 2-Isogenies

      • Reo Yoshida, Katsuyuki Takashima
      Pages 52-65
  3. Key Management and Secret Sharing

  4. Privacy and Digital Rights

    1. The Swiss-Knife RFID Distance Bounding Protocol

      • Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira
      Pages 98-115
    2. Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique

      • Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili
      Pages 116-133
    3. Anonymous Fingerprinting for Predelivery of Contents

      • Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara
      Pages 134-151
    4. Instruction Set Limitation in Support of Software Diversity

      • Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet, Koen De Bosschere
      Pages 152-165
  5. Digital Signature and Voting

    1. Non-interactive Identity-Based DNF Signature Scheme and Its Extensions

      • Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee
      Pages 166-183
    2. How to Balance Privacy with Authenticity

      • Pairat Thorncharoensri, Willy Susilo, Yi Mu
      Pages 184-201
  6. Side Channel Attack

    1. Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches

      • Svetla Nikova, Vincent Rijmen, Martin Schläffer
      Pages 218-234
    2. Novel PUF-Based Error Detection Methods in Finite State Machines

      • Ghaith Hammouri, Kahraman Akdemir, Berk Sunar
      Pages 235-252
  7. Hash and MAC

    1. Extended Models for Message Authentication

      • Liting Zhang, Wenling Wu, Peng Wang
      Pages 286-301
    2. A Preimage Attack for 52-Step HAS-160

      • Yu Sasaki, Kazumaro Aoki
      Pages 302-317

Other Volumes

  1. Information Security and Cryptology – ICISC 2008

About this book

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.

Editors and Affiliations

  • Department of Electronic and Electrical Engineering, Pohang University of Science and Technology (POSTECH), Pohang, Korea

    Pil Joong Lee

  • Department of Mathematical Sciences, Seoul National University, Seoul, Korea

    Jung Hee Cheon

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access