Cargando…

Information Security and Cryptology - ICISC 2009 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers /

ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 2-4, 2009. It was - ganized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS). The aim of...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Lee, Donghoon (Editor ), Hong, Seokhie (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 5984
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Key Management and Key Exchange
  • Generic One Round Group Key Exchange in the Standard Model
  • Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
  • Efficient Certificateless KEM in the Standard Model
  • Public Key Cryptography
  • Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing
  • Factoring Unbalanced Moduli with Known Bits
  • Algebraic Cryptanalysis and Stream Cipher
  • Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared
  • MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals
  • Improved Linear Cryptanalysis of SOSEMANUK
  • Security Management and Efficient Implementation
  • Serial Model for Attack Tree Computations
  • Lightweight Cryptography and RFID: Tackling the Hidden Overheads
  • Side Channel Attack
  • Power Analysis of Single-Rail Storage Elements as Used in MDPL
  • A Timing Attack against Patterson Algorithm in the McEliece PKC
  • Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
  • Privacy Enhanced Technology
  • First CPIR Protocol with Data-Dependent Computation
  • Efficient Fuzzy Matching and Intersection on Private Datasets
  • Efficient Privacy-Preserving Face Recognition
  • Cryptographic Protocol
  • Linear, Constant-Rounds Bit-Decomposition
  • Attacking and Repairing the Improved ModOnions Protocol
  • Secret Handshakes with Revocation Support
  • Cryptanalysis of Hash Function
  • Practical Rebound Attack on 12-Round Cheetah-256
  • Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash
  • Improved Preimage Attack for 68-Step HAS-160
  • Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1
  • Network Security
  • Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
  • Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth.