Skip to main content
  • Conference proceedings
  • © 2011

Information Security and Cryptology - ICISC 2010

13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers

  • Up-to-date report
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6829)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Cryptanalysis

    1. Known and Chosen Key Differential Distinguishers for Block Ciphers

      • Ivica Nikolić, Josef Pieprzyk, PrzemysÅ‚aw SokoÅ‚owski, Ron Steinfeld
      Pages 29-48
    2. Related-Key Attack on the Full HIGHT

      • Bonwook Koo, Deukjo Hong, Daesung Kwon
      Pages 49-67
    3. Preimage Attacks against PKC98-Hash and HAS-V

      • Yu Sasaki, Florian Mendel, Kazumaro Aoki
      Pages 68-91
  3. Cryptographic Algorithms

    1. Group Signatures are Suitable for Constrained Devices

      • Sébastien Canard, Iwen Coisel, Giacomo De Meulenaer, Olivier Pereira
      Pages 133-150
    2. A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW

      • Shoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida
      Pages 151-168
  4. Implementation

    1. Efficient Pairing Computation on Elliptic Curves in Hessian Form

      • Haihua Gu, Dawu Gu, WenLu Xie
      Pages 169-176
    2. FPGA Implementation of an Improved Attack against the DECT Standard Cipher

      • Michael Weiner, Erik Tews, Benedikt Heinz, Johann Heyszl
      Pages 177-188
    3. Chameleon: A Versatile Emulator for Contactless Smartcards

      • Timo Kasper, Ingo von Maurich, David Oswald, Christof Paar
      Pages 189-206
  5. Network and Mobile Security

    1. Revisiting Address Space Randomization

      • Zhi Wang, Renquan Cheng, Debin Gao
      Pages 207-221
    2. Evaluation of a Spyware Detection System Using Thin Client Computing

      • Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis
      Pages 222-232
    3. A Comparative Usability Evaluation of Traditional Password Managers

      • Ambarish Karole, Nitesh Saxena, Nicolas Christin
      Pages 233-251
    4. An Adversarial Evaluation of Network Signaling and Control Mechanisms

      • Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, Angelos Keromytis
      Pages 252-265
  6. Symmetric Key Cryptography

    1. Protecting White-Box AES with Dual Ciphers

      • Mohamed Karroumi
      Pages 278-291

Other Volumes

  1. Information Security and Cryptology - ICISC 2010

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.

Editors and Affiliations

  • Department of IT Convergence Application Engineering, Pukyong National University, Busan, Republic of Korea

    Kyung-Hyune Rhee

  • Department of Computer Science and Information Technology, INHA University, Incheon, Republic of Korea

    DaeHun Nyang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access