Description |
1 online resource (xiii, 434 pages) |
Series |
Lecture notes in computer science ; 6829 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 6829.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Machine generated contents note: Analysis of Nonparametric Estimation Methods for Mutual Information Analysis -- Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher / Alexandre Venelli -- Known and Chosen Key Differential Distinguishers for Block Ciphers / Yi Lu / Yvo Desmedt -- Related-Key Attack on the Full HIGHT / Josef Pieprzyk / Przemystaw Sokolowski / Ivica Nikolic / Ron Steinfeld -- Preimage Attacks against PKC98-Hash and HAS-V / Daesung Kwon / Bonwook Koo / Deukjo Hong -- Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems / Kazumaro Aoki / Florian Mendel / Yu Sasaki -- Cryptanalysis of RSA with Small Prime Combination / Mohammad Reza Sohizadeh Abyaneh -- Twin Bilinear Diffie-Hellman Inversion Problem and Applications / Xianmeng Meng -- Group Signatures Are Suitable for Constrained Devices / Liqun Chen / Yu Chen -- Lightweight 256-bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW / Giacomo De Meulenaer / Iwen Coisel / Sebastien Canard / Olivier Pereira -- Efficient Pairing Computation on Elliptic Curves in Hessian Form / Bart Preneel / Shoichi Hirose / Hirotaka Yoshida / Hidenori Kuwakado / Toru Owada / Kota Ideguchi -- FPGA Implementation of an Improved Attack against the DECT Standard Cipher / Haihua Gu / WenLu Xie / Dawu Gu -- Chameleon: A Versatile Emulator for Contactless Smartcards / Michael Weiner / Erik Tews / Benedikt Heinz / Johann Heyszl -- Revisiting Address Space Randomization / David Oswald / Ingo von Maurich / Timo Kasper / Christof Paar -- Evaluation of a Spyware Detection System Using Thin Client Computing / Zhi Wang / Renquan Cheng / Debin Gao -- Comparative Usability Evaluation of Traditional Password Managers / Vasilis Pappas / Brian M. Bowen / Angelos D. Keromytis |
|
Note continued: Adversarial Evaluation of Network Signaling and Control Mechanisms / Ambarish Karole / Nicolas Christin / Nitesh Saxena -- Secure Personalized Recommendation System for Mobile User / Stelios Sidiroglou-Douskos / Anyelos D. Keromytis / Angelos Stavrou / Kangkook Jee -- Protecting White-Box AES with Dual Ciphers / Soe Yu Maw -- e-MACs: Towards More Secure and More Efficient Constructions of Secure Channels / Mohamed Karroumi -- On Equivalence Classes of Boolean Functions / Radha Poovendran / Basel Alomair -- Public Discussion Must Be Back and Forth in Secure Message Transmission / Thomas Johansson / Qichun Wang -- Scalar Product-Based Distributed Oblivious Transfer / Takeshi Koshiba / Shinya Sawada -- Unconditionally Secure Rational Secret Sharing in Standard Communication Networks / Christian L.F. Corniaux / Hossein Ghodosi -- Oblivious Transfer with Complex Attribute-Based Access Control / Mulan Liu / Zhifang Zhang -- Fault Attacks on the Montgomery Powering Ladder / Fangguo Zhang / Lingling Xu -- First Principal Components Analysis: A New Side Channel Distinguisher / J̲rn-Marc Schmidt / Marcel Medwed -- Fault Analysis on Stream Cipher MUGI / Florent Flament / Jean-Luc Danger / Sylvain Guilley / Maxime Nassar / Youssef Souissi |
Summary |
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack |
Bibliography |
Includes bibliographical references and author index |
Notes |
English |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Algorithms
|
|
algorithms.
|
|
Informatique.
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Rhee, Kyung-Hyune.
|
|
Nyang, DaeHun.
|
ISBN |
9783642242090 |
|
364224209X |
|