Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4296 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talks
- RFID Privacy Based on Public-Key Cryptography
- Generic Attacks on Symmetric Ciphers
- Hash Functions – I
- Improved Collision Attack on the Hash Function Proposed at PKC’98
- Hashing with Polynomials
- Birthday Paradox for Multi-collisions
- Block and Stream Ciphers
- New Variant of the Self-Shrinking Generator and Its Cryptographic Properties
- On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher
- On Algebraic Immunity and Annihilators
- Efficient Implementation and Hardware
- High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem
- A High-Speed Square Root Algorithm in Extension Fields
- The Smallest ARIA Module with 16-Bit Architecture
- A Simpler Sieving Device: Combining ECM and TWIRL
- Network Security and Access Control
- Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks
- A Time-Frame Based Trust Model for P2P Systems
- Spatial Context in Role-Based Access Control
- Mobile Communications Security
- An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks
- Mobile RFID Applications and Security Challenges
- Forensics
- An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time
- Copyright Protection
- A Copy Protection Technique Using Multi-level Error Coding
- Digital Rights Management with Right Delegation for Home Networks
- Biometrics
- Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM
- Hash Functions – II
- Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction
- Cryptanalysis of T-Function-Based Hash Functions
- Collision Search Attack for 53-Step HAS-160
- Public Key Cryptosystems
- Klein Bottle Routing: An Alternative to Onion Routing and Mix Network
- New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
- Digital Signatures
- A New Proxy Signature Scheme Providing Self-delegation
- Extended Sanitizable Signatures.