Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
Kyung-Hyune Rhee, DaeHun Nyang
Springer Science & Business Media, Sep 23, 2011 - Business & Economics - 435 pages
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.
Other editions - View all
adversary algebraic immunity algorithm analysis attack authentication BDHI bias bits block cipher Boolean functions bytes cards ciphertext collision complexity compression function compute construction credentials Cryptanalysis CRYPTO cryptographic decryption denote device differential trail distinguisher distribution E-MACs efficient encryption equation evaluation fault follows group signature HAS-V hash functions Heidelberg Heidelberg 2009 HIGHT ICISC implementation injection input key schedule keystream Lemma Lesamnta-LW linear LNCS MACs Mifare Mifare Classic mutual information nodes Non-Students oblivious transfer Online oracle output pair parameters password manager phase Phone plaintext players polynomial preimage preimage attack private key probability proof proposed protocol query random related-key RFID round S-box secret key secret sharing Section server side-channel signature scheme Springer step stream cipher subkey Table Theorem universal hash universal hash functions variables vector weak keys