Skip to main content
  • Conference proceedings
  • © 2007

Information Security and Cryptology - ICISC 2007

10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4817)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Cryptanalysis – I

    1. Cryptanalysis of a Hash Function Proposed at ICISC 2006

      • Willi Geiselmann, Rainer Steinwandt
      Pages 1-10
    2. Access Control

      1. Handling Dynamic Information Release
        • Li Jiang, Lingdi Ping, Xuezeng Pan
        Pages 64-76
  3. Cryptanalysis – II

    1. Improving the Time Complexity of Matsui’s Linear Cryptanalysis

      • Baudoin Collard, F. -X. Standaert, Jean-Jacques Quisquater
      Pages 77-88
    2. On Large Distributions for Linear Cryptanalysis

      • Alexander Maximov
      Pages 89-101
    3. Passive Attacks on a Class of Authentication Protocols for RFID

      • Basel Alomair, Loukas Lazos, Radha Poovendran
      Pages 102-115
    4. Side Channel Attacks on Irregularly Decimated Generators

      • Chuan-Wen Loe, Khoongming Khoo
      Pages 116-130
    5. System Security

      1. Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences
        • Jesus Molina, Xavier Chorin, Michel Cukier
        Pages 144-155
      2. A Secure Virtual Execution Environment for Untrusted Code
        • Yan Wen, Huaimin Wang
        Pages 156-167
    6. Biometrics

      1. Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum
        • Changlong Jin, Hakil Kim, Stephen Elliott
        Pages 168-179
    7. Cryptographic Protocols

      1. Improving Upon the TET Mode of Operation
        • Palash Sarkar
        Pages 180-192
  4. Hash Functions – I

    1. New Local Collisions for the SHA-2 Hash Family

      • Somitra Kumar Sanadhya, Palash Sarkar
      Pages 193-205
    2. Block and Stream Ciphers

      1. New Results on Impossible Differential Cryptanalysis of Reduced AES
        • Wentao Zhang, Wenling Wu, Dengguo Feng
        Pages 239-250

Other Volumes

  1. Information Security and Cryptology - ICISC 2007

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access