Description |
1 online resource (ix, 394 pages) : illustrations (some color) |
Series |
Lecture notes in computer science ; 7537 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7537.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems / Benoît Libert and Moti Yung -- Cryptanalysis vs. Provable Security / Phong Q. Nguyen -- Boosting Scalability in Anomaly-Based Packed Executable Filtering / Xabier Ugarte-Pedrero, Igor Santos, and Pablo G. Bringas -- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs / Lin Wang, Bing Shen, and TongXu Qiao -- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming / Nicky Mouha, Qingju Wang, Dawu Gu, Bart Preneel -- Adleman-Manders-Miller Root Extraction Method Revisited / Zhengjun Cao, Qian Sha, and Xiao Fan -- Multi-pixel Encryption Visual Cryptography / Teng Guo, Feng Liu, and ChuanKun Wu -- An Improved Electronic Voting Scheme without a Trusted Random Number Generator / Yining Liu, Peiyong Sun, Jihong Yan, Yajun Li, and Jianyu Cao -- Fault Attacks against the Miller Algorithm in Hessian Coordinates / Jiang Weng, Yunqi Dou, and Chuangui Ma -- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion / Wei Huang, Xianfeng Zhao, Dengguo Feng, and Rennong Sheng -- Improved Tradeoff between Encapsulation and Decapsulation of HK09 / Xianhui Lu, Bao Li, Qiriang Mei, and Yamin Liu -- Non-interactive Deniable Authentication Protocols / Haibo Tian, Xianofeng Chen, and Zhengtao Jiang -- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3 / Haixin Song, Xiubin Fan, Chuankun Wu, and Dengguo Feng -- Efficient Self-certified Signatures with Batch Verification / Nan Li, Yi Mu, and Willy Susilo -- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening / Jiang Zhang, Xiang Xie, Rui Zhang, and Zhenfeng Zhang -- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves / Xusheng Zhang, Shan Chen, and Dongdai Lin -- Weak-Key Class of MISTY1 for Related-Key Differential Attack / Yi-bin Dai, and Shao-zhen Chen -- Cryptanalysis of Reduced-Round KLEIN Block Cipher / Xiaoli Yu, Wenling Wu, Yanjun Li, and Lei Zhang -- An Efficient RSA Implementation without Precomputation / Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, and Meng Yu -- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures / Gautham Sekar -- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation / Naoto Kiribuchi, Ryo Kato, Takashi Nishide, and Hiroshi Yoshiura -- Towards Attack Resilient Social Network Based Threshold Signing / Jian Zhou, Ji Xiang, and Neng Gao -- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings / Jiang Zhang and Zhenfeng Zhang -- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model / Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung-Hyune Rhee, and Kouichi Sakurai -- Concurrent non-malleable witness indistinguishable argument from any one-way function / Guifang Huang and Lei Hu -- Pseudorandom generators based on subcovers for finite groups / Chenggen Song, Maozhi Xu, and Chunming Tang |
Summary |
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from digital title page (viewed on November 16, 2012) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Cryptography -- Congresses
|
|
Informatique.
|
|
Computer security
|
|
Cryptography
|
|
Data encryption (Computer science)
|
Genre/Form |
Conference papers and proceedings
|
|
Software.
|
Form |
Electronic book
|
Author |
Wu, Chuan'gun, editor.
|
|
Yung, Moti, editor.
|
|
Lin, Dongdai, editor
|
ISBN |
9783642347047 |
|
3642347045 |
|