信息安全與密碼學國際會議論文集

信息安全與密碼學國際會議論文集

《信息安全與密碼學國際會議論文集(2008)(英文)》是2008年12月在北京召開的第四屆中國密碼學與信息安全國際會議(The 4th China International Conference on InformarionSecurity and Cryptology-Inscrypt 2008)的短文論文集。Inscrypt系列國際會議是由信息安全國家重點實驗室發起,與中國密碼學會聯合舉辦的高水平國際會議,每年在中國舉辦一次,該會議論文集由Springer出版社出版。《信息安全與密碼學國際會議論文集(2008)(英文)》收錄了這次會議的短文12篇。主要內容包括密碼算法、數字簽名與認證、安全協定、密碼實現與套用等。《信息安全與密碼學國際會議論文集(2008)(英文)》可供從事密碼學、信息安全、通信與信息系統、計算機套用技術等專業的科技人員和高等院校師生參考。

基本介紹

  • 書名:信息安全與密碼學國際會議論文集
  • 出版社:科學出版社
  • 頁數:172頁
  • 開本:32
  • 品牌:北京科瀚偉業
  • 作者:等 林東岱 林東岱
  • 出版日期:2009年6月1日
  • 語種:英語
  • ISBN:9787030246158
內容簡介,圖書目錄,序言,

內容簡介

《信息安全與密碼學國際會議論文集(2008)(英文)》為科學出版社出版。

圖書目錄

Ⅰ Stream Cipher and Elliptic Curve Algorithm
Cryptanalysis of Generalized Self-shrinking Generator
Fast Scalar Multiplication on a Family of Supersingular Curves over IF2m

Ⅱ Digital Signature and Authentication Scheme
An Efficient Proxy Signature Scheme without Random Oracle Model
Provable Secure Signature Scheme with Partial Sanitization and Disclosure "
An Evaluation of Improvement Scheme for Boundary Problem in
Cancelable Biometrics Based on Block Scramble

Ⅲ Key Management Protocols
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
New Two-Party Identity-based Authenticated Key Agreement Protocol without Random Oracles
A Multilevel Secure Key Predistribution Scheme.in Wireless Sensor Networks

Ⅳ Hardware Implementation and Side Channel Attack
FPGA & ASIC hnplementation of Differential Power:Analysis Attack on AES
Robustness and Interoperability Problems in Security Devices

Ⅴ Applications and Steganography
Analysis and Improvements of a Secure E-Tender Submission Protocol.
Block Based Minimum Distortion Steganography
Author Index

序言

The Fourth China International Conference on Information Security and Cryptology (Inscrypt 2008) was co-organized by the State Key Laboratory of Information Security and by the Chinese Association for Cryptologic Research. The conference was held in Beijing, China in mid-december, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China.
Given its four year success, Inscrypt is now a tradition. It is, in fact, a leading annual international event in the area of cryptography and information security taking place in China. We are pleased to report the continuous support of the entire community: authors, attendees, committee members, reviewers, sponsors and organizers. This state of affairs reflects the fact that the research areas covered by Inscrypt are important to modern computing, where increased security, trust, safety and reliability are required. This need makes sure that the relevant research community, world wide, continues producing important fundamental, experimental and applied work in the wide areas of cryptography and information security research. It is not a surprise that the scientific program of Inscrypt 2008 covered numerous fields of research within these general areas.
The International Program Committee of Inscrypt 2008 received a total of 183 submissions from 23 countries and regions, from which only 28 submissions were selected for presentation as regular papers which are published by Springer in the series of Lecture Notes in Computer Science, and 12 submissions were selected as short paper presentations which are published in this proceedings. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were chosen to the various tracks. The selection to both tracks was a highly" competitive process. We also note that reviews of submissions by committee members were hidden from their authors throughout the entire review process. We further noted that due to the conference format, many good papers have not been accepted regrettably.
Inscrypt 2008 was made possible by the joint efforts of numerous people and organizations worldwide. We take this opportunity to thank the Program Commitee members and the external experts they employed for their invaluable help in producing the conference program. We further thank the conference Organizing Committee, the various sponsors and the conference attendees. Last but not least, we express our great gratitude to all the authors who submitted papers to the conference, the invited speakers and the session Chairs.
  

相關詞條

熱門詞條

聯絡我們