Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. (English) Zbl 1225.68026

Lecture Notes in Computer Science 6829. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). xiii, 435 p. (2011).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1191.68015].
Indexed articles:
Venelli, Alexandre, Analysis of nonparametric estimation methods for mutual information analysis, 1-15 [Zbl 1297.94108]
Lu, Yi; Desmedt, Yvo, Bias analysis of a certain problem with applications to E0 and Shannon cipher, 16-28 [Zbl 1297.94089]
Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron, Known and chosen key differential distinguishers for block ciphers, 29-48 [Zbl 1297.94094]
Koo, Bonwook; Hong, Deukjo; Kwon, Daesung, Related-key attack on the full HIGHT, 49-67 [Zbl 1297.94081]
Sasaki, Yu; Mendel, Florian; Aoki, Kazumaro, Preimage attacks against PKC98-Hash and HAS-V, 68-91 [Zbl 1297.94100]
Sohizadeh Abyaneh, Mohammad Reza, Passive cryptanalysis of the unconditionally secure authentication protocol for RFID systems, 92-103 [Zbl 1297.94121]
Meng, Xianmeng, Cryptanalysis of RSA with small prime combination, 104-112 [Zbl 1279.94103]
Chen, Yu; Chen, Liqun, The twin bilinear Diffie-Hellman inversion problem and applications, 113-132 [Zbl 1279.94064]
Canard, Sébastien; Coisel, Iwen; De Meulenaer, Giacomo; Pereira, Olivier, Group signatures are suitable for constrained devices, 133-150 [Zbl 1292.94042]
Hirose, Shoichi; Ideguchi, Kota; Kuwakado, Hidenori; Owada, Toru; Preneel, Bart; Yoshida, Hirotaka, A lightweight 256-bit hash function for hardware and low-end devices: Lesamnta-LW, 151-168 [Zbl 1292.94078]
Gu, Haihua; Gu, Dawu; Xie, Wenlu, Efficient pairing computation on elliptic curves in Hessian form, 169-176 [Zbl 1292.94068]
Weiner, Michael; Tews, Erik; Heinz, Benedikt; Heyszl, Johann, FPGA implementation of an improved attack against the DECT standard cipher, 177-188 [Zbl 1292.94152]
Karroumi, Mohamed, Protecting white-box AES with dual ciphers, 278-291 [Zbl 1297.94078]
Alomair, Basel; Poovendran, Radha, \(\mathcal{E}\)-MACs: towards more secure and more efficient constructions of secure channels, 292-310 [Zbl 1339.94034]
Wang, Qichun; Johansson, Thomas, On equivalence classes of Boolean functions, 311-324 [Zbl 1339.94103]
Koshiba, Takeshi; Sawada, Shinya, Public discussion must be back and forth in secure message transmission, 325-337 [Zbl 1341.68044]
Corniaux, Christian L. F.; Ghodosi, Hossein, Scalar product-based distributed oblivious transfer, 338-354 [Zbl 1297.94060]
Zhang, Zhifang; Liu, Mulan, Unconditionally secure rational secret sharing in standard communication networks, 355-369 [Zbl 1297.94122]
Xu, Lingling; Zhang, Fangguo, Oblivious transfer with complex attribute-based access control, 370-395 [Zbl 1297.94112]
Schmidt, Jörn-Marc; Medwed, Marcel, Fault attacks on the Montgomery powering ladder, 396-406 [Zbl 1297.94102]
Souissi, Youssef; Nassar, Maxime; Guilley, Sylvain; Danger, Jean-Luc; Flament, Florent, First principal components analysis: a new side channel distinguisher, 407-419 [Zbl 1341.68045]
Takahashi, Junko; Fukunaga, Toshinori; Sakiyama, Kazuo, Fault analysis on stream cipher MUGI, 420-434 [Zbl 1297.94106]


68-06 Proceedings, conferences, collections, etc. pertaining to computer science
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
68P25 Data encryption (aspects in computer science)
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest


Zbl 1191.68015
Full Text: DOI