Skip to main content
  • Conference proceedings
  • © 2009

Information Security and Cryptology

4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5487)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology

Conference proceedings info: Inscrypt 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

  2. Invited Talks

    1. Key Evolution Systems in Untrusted Update Environments

      • Benoît Libert, Jean-Jacques Quisquater, Moti Yung
      Pages 12-21
  3. Digital Signature and Signcryption Schemes

    1. Provably Secure Convertible Nominative Signature Scheme

      • Wei Zhao, Changlu Lin, Dingfeng Ye
      Pages 23-40
    2. Cryptanalysis of Two Ring Signcryption Schemes

      • Huaqun Wang, Hong Yu
      Pages 41-46
    3. Efficient Signcryption Key Encapsulation without Random Oracles

      • Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 47-59
  4. Privacy and Anonymity

    1. Strong Anonymous Signatures

      • Rui Zhang, Hideki Imai
      Pages 60-71
    2. Publicly Verifiable Privacy-Preserving Group Decryption

      • Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
      Pages 72-83
    3. Privacy for Private Key in Signatures

      • Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
      Pages 84-95
  5. Message Authentication Code and Hash Function

    1. Security of Truncated MACs

      • Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu
      Pages 96-114
    2. Security Analysis of Multivariate Polynomials for Hashing

      • Luk Bettale, Jean-Charles Faugère, Ludovic Perret
      Pages 115-124
  6. Secure Protocols

    1. Batch ZK Proof and Verification of OR Logic

      • Kun Peng, Feng Bao
      Pages 141-156
  7. Symmetric Cryptography

    1. Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs

      • Debra L. Cook, Moti Yung, Angelos Keromytis
      Pages 157-180
    2. Impossible Differential Analysis of Reduced Round CLEFIA

      • Wenying Zhang, Jing Han
      Pages 181-191
    3. Reducible Polynomial over \(\mathbb{F}_{2}\) Constructed by Trinomial σ−LFSR

      • Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan
      Pages 192-200
  8. Certificateless Cryptography

    1. Further Observations on Certificateless Public Key Encryption

      • Xu an Wang, Xinyi Huang, Xiaoyuan Yang
      Pages 217-239
  9. Hardware Implementation and Side Channel Attack

    1. Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing

      • Mooseop Kim, Jaecheol Ryou, Sungik Jun
      Pages 240-252

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.

Editors and Affiliations

  • Computer Science Department, Google Inc. and Columbia University, New York, NY, USA

    Moti Yung

  • College of Information Sciences and Technology, Pennsylvania State University, University Park, USA

    Peng Liu

  • SKLOIS, Institute of Software, Chinese Academy of Sciences, Beijing, China

    Dongdai Lin

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access