Cargando…

Information Security and Cryptoloy - ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers /

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully s...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Lee, Pil Joong (Editor ), Cheon, Jung Hee (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5461
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-00730-9
003 DE-He213
005 20220114190056.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642007309  |9 978-3-642-00730-9 
024 7 |a 10.1007/978-3-642-00730-9  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Information Security and Cryptoloy - ICISC 2008  |h [electronic resource] :  |b 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers /  |c edited by Pil Joong Lee, Jung Hee Cheon. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XIII, 433 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 5461 
505 0 |a Public Key Encryption -- Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption -- Distributed Attribute-Based Encryption -- Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors -- Simple Algorithms for Computing a Sequence of 2-Isogenies -- Key Management and Secret Sharing -- Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks -- Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images -- Privacy and Digital Rights -- The Swiss-Knife RFID Distance Bounding Protocol -- Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique -- Anonymous Fingerprinting for Predelivery of Contents -- Instruction Set Limitation in Support of Software Diversity -- Digital Signature and Voting -- Non-interactive Identity-Based DNF Signature Scheme and Its Extensions -- How to Balance Privacy with Authenticity -- Efficient Vote Validity Check in Homomorphic Electronic Voting -- Side Channel Attack -- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches -- Novel PUF-Based Error Detection Methods in Finite State Machines -- Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices -- Hash and MAC -- A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs -- Extended Models for Message Authentication -- A Preimage Attack for 52-Step HAS-160 -- Primitives and Foundations -- Essentially Optimal Universally Composable Oblivious Transfer -- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification -- Proving a Shuffle Using Representations of the Symmetric Group -- On Formal Verification of Arithmetic-Based Cryptographic Primitives -- Block and Stream -- A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent -- Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis -- Higher Order Differential Attacks on Reduced-Round MISTY1. 
520 |a This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 0 |a Computer science-Mathematics. 
650 0 |a Discrete mathematics. 
650 0 |a Data protection. 
650 0 |a Electronic data processing-Management. 
650 0 |a Algorithms. 
650 1 4 |a Cryptology. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Discrete Mathematics in Computer Science. 
650 2 4 |a Data and Information Security. 
650 2 4 |a IT Operations. 
650 2 4 |a Algorithms. 
700 1 |a Lee, Pil Joong.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Cheon, Jung Hee.  |e editor.  |0 (orcid)0000-0002-7085-2220  |1 https://orcid.org/0000-0002-7085-2220  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642007316 
776 0 8 |i Printed edition:  |z 9783642007293 
830 0 |a Security and Cryptology ;  |v 5461 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-00730-9  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)