Limit search to available items
Book Cover
E-book
Author ICISC (Conference) (13th : 2010 : Chung-Ang University)

Title Information security and cryptology-- ICISC 2010 : 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers / Kyung-Hyune Rhee, DaeHun Nyang (eds.)
Published Berlin ; New York : Springer, ©2011

Copies

Description 1 online resource (xiii, 434 pages)
Series Lecture notes in computer science ; 6829
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6829.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Machine generated contents note: Analysis of Nonparametric Estimation Methods for Mutual Information Analysis -- Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher / Alexandre Venelli -- Known and Chosen Key Differential Distinguishers for Block Ciphers / Yi Lu / Yvo Desmedt -- Related-Key Attack on the Full HIGHT / Josef Pieprzyk / Przemystaw Sokolowski / Ivica Nikolic / Ron Steinfeld -- Preimage Attacks against PKC98-Hash and HAS-V / Daesung Kwon / Bonwook Koo / Deukjo Hong -- Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems / Kazumaro Aoki / Florian Mendel / Yu Sasaki -- Cryptanalysis of RSA with Small Prime Combination / Mohammad Reza Sohizadeh Abyaneh -- Twin Bilinear Diffie-Hellman Inversion Problem and Applications / Xianmeng Meng -- Group Signatures Are Suitable for Constrained Devices / Liqun Chen / Yu Chen -- Lightweight 256-bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW / Giacomo De Meulenaer / Iwen Coisel / Sebastien Canard / Olivier Pereira -- Efficient Pairing Computation on Elliptic Curves in Hessian Form / Bart Preneel / Shoichi Hirose / Hirotaka Yoshida / Hidenori Kuwakado / Toru Owada / Kota Ideguchi -- FPGA Implementation of an Improved Attack against the DECT Standard Cipher / Haihua Gu / WenLu Xie / Dawu Gu -- Chameleon: A Versatile Emulator for Contactless Smartcards / Michael Weiner / Erik Tews / Benedikt Heinz / Johann Heyszl -- Revisiting Address Space Randomization / David Oswald / Ingo von Maurich / Timo Kasper / Christof Paar -- Evaluation of a Spyware Detection System Using Thin Client Computing / Zhi Wang / Renquan Cheng / Debin Gao -- Comparative Usability Evaluation of Traditional Password Managers / Vasilis Pappas / Brian M. Bowen / Angelos D. Keromytis
Note continued: Adversarial Evaluation of Network Signaling and Control Mechanisms / Ambarish Karole / Nicolas Christin / Nitesh Saxena -- Secure Personalized Recommendation System for Mobile User / Stelios Sidiroglou-Douskos / Anyelos D. Keromytis / Angelos Stavrou / Kangkook Jee -- Protecting White-Box AES with Dual Ciphers / Soe Yu Maw -- e-MACs: Towards More Secure and More Efficient Constructions of Secure Channels / Mohamed Karroumi -- On Equivalence Classes of Boolean Functions / Radha Poovendran / Basel Alomair -- Public Discussion Must Be Back and Forth in Secure Message Transmission / Thomas Johansson / Qichun Wang -- Scalar Product-Based Distributed Oblivious Transfer / Takeshi Koshiba / Shinya Sawada -- Unconditionally Secure Rational Secret Sharing in Standard Communication Networks / Christian L.F. Corniaux / Hossein Ghodosi -- Oblivious Transfer with Complex Attribute-Based Access Control / Mulan Liu / Zhifang Zhang -- Fault Attacks on the Montgomery Powering Ladder / Fangguo Zhang / Lingling Xu -- First Principal Components Analysis: A New Side Channel Distinguisher / J̲rn-Marc Schmidt / Marcel Medwed -- Fault Analysis on Stream Cipher MUGI / Florent Flament / Jean-Luc Danger / Sylvain Guilley / Maxime Nassar / Youssef Souissi
Summary This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack
Bibliography Includes bibliographical references and author index
Notes English
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Algorithms
algorithms.
Informatique.
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Rhee, Kyung-Hyune.
Nyang, DaeHun.
ISBN 9783642242090
364224209X