Information Security and Cryptoloy - ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers /
This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully s...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Security and Cryptology ;
5461 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Public Key Encryption
- Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
- Distributed Attribute-Based Encryption
- Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
- Simple Algorithms for Computing a Sequence of 2-Isogenies
- Key Management and Secret Sharing
- Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
- Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
- Privacy and Digital Rights
- The Swiss-Knife RFID Distance Bounding Protocol
- Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique
- Anonymous Fingerprinting for Predelivery of Contents
- Instruction Set Limitation in Support of Software Diversity
- Digital Signature and Voting
- Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
- How to Balance Privacy with Authenticity
- Efficient Vote Validity Check in Homomorphic Electronic Voting
- Side Channel Attack
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Novel PUF-Based Error Detection Methods in Finite State Machines
- Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
- Hash and MAC
- A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs
- Extended Models for Message Authentication
- A Preimage Attack for 52-Step HAS-160
- Primitives and Foundations
- Essentially Optimal Universally Composable Oblivious Transfer
- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
- Proving a Shuffle Using Representations of the Symmetric Group
- On Formal Verification of Arithmetic-Based Cryptographic Primitives
- Block and Stream
- A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent
- Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis
- Higher Order Differential Attacks on Reduced-Round MISTY1.