Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers /

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully s...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Lee, Pil Joong (Επιμελητής έκδοσης), Cheon, Jung Hee (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Σειρά:Lecture Notes in Computer Science, 5461
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Public Key Encryption
  • Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
  • Distributed Attribute-Based Encryption
  • Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
  • Simple Algorithms for Computing a Sequence of 2-Isogenies
  • Key Management and Secret Sharing
  • Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
  • Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
  • Privacy and Digital Rights
  • The Swiss-Knife RFID Distance Bounding Protocol
  • Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique
  • Anonymous Fingerprinting for Predelivery of Contents
  • Instruction Set Limitation in Support of Software Diversity
  • Digital Signature and Voting
  • Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
  • How to Balance Privacy with Authenticity
  • Efficient Vote Validity Check in Homomorphic Electronic Voting
  • Side Channel Attack
  • Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
  • Novel PUF-Based Error Detection Methods in Finite State Machines
  • Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
  • Hash and MAC
  • A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs
  • Extended Models for Message Authentication
  • A Preimage Attack for 52-Step HAS-160
  • Primitives and Foundations
  • Essentially Optimal Universally Composable Oblivious Transfer
  • Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
  • Proving a Shuffle Using Representations of the Symmetric Group
  • On Formal Verification of Arithmetic-Based Cryptographic Primitives
  • Block and Stream
  • A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent
  • Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis
  • Higher Order Differential Attacks on Reduced-Round MISTY1.