Limit search to available items
Book Cover
E-book
Author Inscrypt (Conference) (7th : 2011 : Beijing, China)

Title Information security and cryptology : 7th international conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011 : revised selected papers / Chuan-Kun Wu, Moti Yung, Dongdai Lin (eds.)
Published Heidelberg ; New York : Springer, [2012]
©2012
Online access available from:
Springer eBooks    View Resource Record  

Copies

Description 1 online resource (ix, 394 pages) : illustrations (some color)
Series Lecture notes in computer science ; 7537
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7537
LNCS sublibrary. SL 4, Security and cryptology.
Contents Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems / Benoît Libert and Moti Yung -- Cryptanalysis vs. Provable Security / Phong Q. Nguyen -- Boosting Scalability in Anomaly-Based Packed Executable Filtering / Xabier Ugarte-Pedrero, Igor Santos, and Pablo G. Bringas -- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs / Lin Wang, Bing Shen, and TongXu Qiao -- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming / Nicky Mouha, Qingju Wang, Dawu Gu, Bart Preneel -- Adleman-Manders-Miller Root Extraction Method Revisited / Zhengjun Cao, Qian Sha, and Xiao Fan -- Multi-pixel Encryption Visual Cryptography / Teng Guo, Feng Liu, and ChuanKun Wu -- An Improved Electronic Voting Scheme without a Trusted Random Number Generator / Yining Liu, Peiyong Sun, Jihong Yan, Yajun Li, and Jianyu Cao -- Fault Attacks against the Miller Algorithm in Hessian Coordinates / Jiang Weng, Yunqi Dou, and Chuangui Ma -- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion / Wei Huang, Xianfeng Zhao, Dengguo Feng, and Rennong Sheng -- Improved Tradeoff between Encapsulation and Decapsulation of HK09 / Xianhui Lu, Bao Li, Qiriang Mei, and Yamin Liu -- Non-interactive Deniable Authentication Protocols / Haibo Tian, Xianofeng Chen, and Zhengtao Jiang -- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3 / Haixin Song, Xiubin Fan, Chuankun Wu, and Dengguo Feng -- Efficient Self-certified Signatures with Batch Verification / Nan Li, Yi Mu, and Willy Susilo -- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening / Jiang Zhang, Xiang Xie, Rui Zhang, and Zhenfeng Zhang -- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves / Xusheng Zhang, Shan Chen, and Dongdai Lin -- Weak-Key Class of MISTY1 for Related-Key Differential Attack / Yi-bin Dai, and Shao-zhen Chen -- Cryptanalysis of Reduced-Round KLEIN Block Cipher / Xiaoli Yu, Wenling Wu, Yanjun Li, and Lei Zhang -- An Efficient RSA Implementation without Precomputation / Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, and Meng Yu -- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures / Gautham Sekar -- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation / Naoto Kiribuchi, Ryo Kato, Takashi Nishide, and Hiroshi Yoshiura -- Towards Attack Resilient Social Network Based Threshold Signing / Jian Zhou, Ji Xiang, and Neng Gao -- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings / Jiang Zhang and Zhenfeng Zhang -- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model / Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung-Hyune Rhee, and Kouichi Sakurai -- Concurrent non-malleable witness indistinguishable argument from any one-way function / Guifang Huang and Lei Hu -- Pseudorandom generators based on subcovers for finite groups / Chenggen Song, Maozhi Xu, and Chunming Tang
Summary This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications
Bibliography Includes bibliographical references and author index
Notes Online resource; title from digital title page (viewed on Nov. 16, 2012)
Subject Data encryption (Computer science) -- Congresses.
Computer security -- Congresses.
Cryptography -- Congresses.
Genre/Form Conference papers and proceedings.
Computer software.
Conference papers and proceedings.
Form Electronic book
Author Wu, Chuan'gun, editor
Yung, Moti, editor
Lin, Dongdai, editor
LC no. 2012950703
ISBN 9783642347047 (electronic bk.)
3642347045 (electronic bk.)
(print)
(print)
Other Titles Inscrypt 2011