Editors:
- High quality selected papers
- Unique visibility
- State of the art research
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6584)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology
Conference proceedings info: Inscrypt 2010.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (35 papers)
-
Front Matter
-
Stream Ciphers, Sequences and Elliptic Curves
-
Hash Functions
-
Key Management
About this book
The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.
Editors and Affiliations
-
Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China
Xuejia Lai
-
Columbia University, USA
Moti Yung
-
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, China
Dongdai Lin
Bibliographic Information
Book Title: Information Security and Cryptology
Book Subtitle: 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
Editors: Xuejia Lai, Moti Yung, Dongdai Lin
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-21518-6
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Berlin Heidelberg 2011
Softcover ISBN: 978-3-642-21517-9Published: 08 July 2011
eBook ISBN: 978-3-642-21518-6Published: 08 July 2011
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 524
Number of Illustrations: 60 b/w illustrations, 31 illustrations in colour
Topics: Computer Communication Networks, Cryptology, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Systems and Data Security, Computers and Society