Information Security and Cryptology

Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings

  • Helger Lipmaa
  • Moti Yung
  • Dongdai Lin
Conference proceedings Inscrypt 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4318)

Table of contents

  1. Front Matter
  2. Digital Signature Schemes

    1. Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun
      Pages 1-12
    2. Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
      Pages 13-26
    3. Benoît Libert, Jean-Jacques Quisquater, Moti Yung
      Pages 27-41
  3. Sequences and Stream Ciphers

    1. Xin Tong, Jie Zhang, Qiao-Yan Wen
      Pages 42-53
    2. Xuexian Hu, Yongtao Ming, Wenfen Liu, Shiqu Li
      Pages 54-65
  4. Symmetric-Key Cryptography

    1. Dayin Wang, Dongdai Lin, Wenling Wu
      Pages 78-87
  5. Cryptographic Schemes

    1. Christophe Tartary, Huaxiong Wang
      Pages 103-117
    2. Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski
      Pages 130-143
  6. Network Security

    1. Shi Yi, Yang Xinyu, Li Ning, Qi Yong
      Pages 144-152
    2. You Chen, Yang Li, Xue-Qi Cheng, Li Guo
      Pages 153-167
    3. Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao
      Pages 168-181
  7. Access Control

    1. Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou
      Pages 196-210
    2. SeongKi Kim, EunKyung Jin, YoungJin Song, SangYong Han
      Pages 211-224
  8. Computer and Applications Security

    1. Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hong
      Pages 238-252
    2. Zhan Wang, Yoshiaki Hori, Kouichi Sakurai
      Pages 253-263
  9. Web and Media Security

  10. Back Matter

About these proceedings


The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of Chinese Academy of Sciences and the National Natural Science Foundations of China. The c- ference proceedings, with contributed papers, are published by Springer in this volume of Lecture Notes in Computer Science (LNCS). The research areas covered by Inscrypt have been gaining increased visibility recently since modern computing and communication infrastructures and app- cations require increased security, trust and safety. Indeed important fundam- tal, experimental and applied work has been done in wide areasof cryptography and information security research in recent years. Accordingly, the program of Inscrypt 2006 covered numerous ?elds of research within these areas. The International Program Committee of the conference received a total of 225 submissions, from which only 23 submissions were selected for presentation at the regular papers track and are part of this volume. In addition to this track, the conference also hosted a short paper track of 13 presentations that were carefully selected as well. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were selected to the various tracks.


DDos attacks access control anonymity authentication block ciphers cryptanalysis cryptographic protocols fingerprinting information hiding intrusion detection network security pairings security modeling signatur schemes signcryption spam fi

Editors and affiliations

  • Helger Lipmaa
    • 1
  • Moti Yung
    • 2
  • Dongdai Lin
    • 3
  1. 1.University College LondonUK
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew York, NYUSA
  3. 3.SKLOIS Lab, Institute of SoftwareChinese Academy of SciencesBeijingP.R. China

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-49608-3
  • Online ISBN 978-3-540-49610-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site