Vai al contenuto principale della pagina

Information security and cryptology-- ICISC 2011 : 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised selected papers / Howon Kim (ed.).



(Visualizza formato Marc21)    (visualizza in BIBRAME 2.0)

Creatore: ICISC (Conference) (14th : 2011 : Seoul, Korea)
Titolo: Information security and cryptology-- ICISC 2011 : 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised selected papers / Howon Kim (ed.).
Link to work: Information Security and Cryptology - ICISC 2011 Visualizza cluster
Pubblicazione: Berlin ; New York : Springer, ©2012
Estensione: 1 online resource (xii, 512 pages) : illustrations.
Tipo formato: computer
Tipo contenuto: text
Tipo supporto: online resource
Titolo uniforme di collana: Lecture notes in computer science ; 7259. 1611-3349
LNCS sublibrary. SL 4, Security and cryptology.
Genere/Forma: Electronic books
Conference papers and proceedings
Index term-Uncontrolled: Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Information Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Discrete Mathematics in Computer Science
Soggetto non controllato: Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Information Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Discrete Mathematics in Computer Science
Termine d'indicizzazione-Occupazione: Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Information Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Discrete Mathematics in Computer Science
Classificazione LOC: QA76.9.A25 I25 2012
Creatori/Collaboratori: Kim, Howon
Contenuto supplementare: Includes bibliographical references and author index.
Nota di contenuto: Improved Integral Analysis on Tweaked Lesamnta / Yu Sasaki and Kazumaro Aoki -- Analysis of Trivium Using Compressed Right Hand Side Equations / Thorsten Ernst Schilling and Håvard Raddum -- Cryptanalysis of Round-Reduced HAS-160 / Florian Mendel, Tomislav Nad and Martin Schläffer -- An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software / Daehyun Strobel and Christof Paar -- An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks / Hailong Zhang, Yongbin Zhou and Dengguo Feng -- Correcting Errors in Private Keys Obtained from Cold Boot Attacks / Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek and Jung Hee Cheon -- Strong Security Notions for Timed-Release Public-Key Encryption Revisited / Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto and Taiichi Saito -- Fully Secure Unidirectional Identity-Based Proxy Re-encryption / Song Luo, Qingni Shen and Zhong Chen -- Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition / Yong Qiao, Yuexiang Yang, Jie He, Bo Liu and Yingzhi Zeng -- AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability / Kai Chen, Yifeng Lian and Yingjun Zhang -- Weaknesses in Current RSA Signature Schemes / Juliane Krämer, Dmitry Nedospasov and Jean-Pierre Seifert.
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations / Shuguo Yang, Yongbin Zhou, Jiye Liu and Danyang Chen -- A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users / Keita Emura, Atsuko Miyaji and Kazumasa Omote -- Generic Constructions for Verifiable Signcryption / Laila El Aimani -- Non-delegatable Strong Designated Verifier Signature on Elliptic Curves / Haibo Tian, Xiaofeng Chen, Zhengtao Jiang and Yusong Du -- An Improved Known Plaintext Attack on PKZIP Encryption Algorithm / Kyung Chul Jeong, Dong Hoon Lee and Daewan Han -- Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit / Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding and Jianchun Jiang -- On the Resistance of Boolean Functions against Fast Algebraic Attacks / Yusong Du, Fangguo Zhang and Meicheng Liu -- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model / Yu Chen, Liqun Chen and Zongyang Zhang -- Design, Implementation, and Evaluation of a Vehicular Hardware Security Module / Marko Wolf and Timo Gendrullis -- Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection / Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd and Juan Gonzalez Nieto -- Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering / Paolo Palmieri and Olivier Pereira.
Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing / Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida -- Biclique Attack on the Full HIGHT / Deukjo Hong, Bonwook Koo and Daesung Kwon -- Preimage Attacks on Step-Reduced SM3 Hash Function / Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su and Le Dong -- Breaking a 3D-Based CAPTCHA Scheme / Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo -- Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control / Fangming Zhao, Takashi Nishide and Kouichi Sakurai -- Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes / Zhenfei Zhang, Thomas Plantard and Willy Susilo -- A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval Arithmetic / Teruya Minamoto and Ryuji Ohura -- On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks / Ashish Choudhury and Arpita Patra -- Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles / Kazuki Yoneyama -- Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys / Atsushi Fujioka and Koutarou Suzuki.
Sommario/riassunto: This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol.
Collana: Lecture notes in computer science, 1611-3349 ; 7259
LNCS sublibrary. SL 4, Security and cryptology
Varianti del titolo: ICISC 2011
ISBN: 9783642319129
3642319122
3642319114
9783642319112
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 11077079
Localizzazioni e accesso elettronico http://link.springer.com/10.1007/978-3-642-31912-9
Lo trovi qui: University of Chicago
Item: Permalink to OPAC
Altra ed. diverso supporto: Printed edition: 9783642319112