Skip to main content
  • Conference proceedings
  • © 2012

Information Security and Cryptology - ICISC 2011

14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers

Editors:

  • Up to date results
  • Fast track conference proceedings
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7259)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. Hash Function I

    1. Improved Integral Analysis on Tweaked Lesamnta

      • Yu Sasaki, Kazumaro Aoki
      Pages 1-17
    2. Analysis of Trivium Using Compressed Right Hand Side Equations

      • Thorsten Ernst Schilling, HÃ¥vard Raddum
      Pages 18-32
    3. Cryptanalysis of Round-Reduced HAS-160

      • Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 33-47
  3. Side Channel Analysis I

    1. An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks

      • Hailong Zhang, Yongbin Zhou, Dengguo Feng
      Pages 61-73
    2. Correcting Errors in Private Keys Obtained from Cold Boot Attacks

      • Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek, Jung Hee Cheon
      Pages 74-87
  4. Public Key Cryptography

    1. Strong Security Notions for Timed-Release Public-Key Encryption Revisited

      • Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito
      Pages 88-108
    2. Fully Secure Unidirectional Identity-Based Proxy Re-encryption

      • Song Luo, Qingni Shen, Zhong Chen
      Pages 109-126
  5. Network and Mobile Security

    1. Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition

      • Yong Qiao, Yuexiang Yang, Jie He, Bo Liu, Yingzhi Zeng
      Pages 127-139
  6. Digital Signature

    1. Weaknesses in Current RSA Signature Schemes

      • Juliane Krämer, Dmitry Nedospasov, Jean-Pierre Seifert
      Pages 155-168
  7. Side Channel Analysis II

    1. Non-delegatable Strong Designated Verifier Signature on Elliptic Curves

      • Haibo Tian, Xiaofeng Chen, Zhengtao Jiang, Yusong Du
      Pages 219-234
  8. Cryptanalysis

    1. An Improved Known Plaintext Attack on PKZIP Encryption Algorithm

      • Kyung Chul Jeong, Dong Hoon Lee, Daewan Han
      Pages 235-247
    2. Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit

      • Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang
      Pages 248-260
    3. On the Resistance of Boolean Functions against Fast Algebraic Attacks

      • Yusong Du, Fangguo Zhang, Meicheng Liu
      Pages 261-274

Other Volumes

  1. Information Security and Cryptology - ICISC 2011

About this book

This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol.

Editors and Affiliations

  • (A06) 6503 School of Computer Science and Engineering, Pusan National University, GeumJeong-Gu, South Korea

    Howon Kim

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access