Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers /
This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully s...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Σειρά: | Lecture Notes in Computer Science,
5461 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Public Key Encryption
- Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
- Distributed Attribute-Based Encryption
- Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
- Simple Algorithms for Computing a Sequence of 2-Isogenies
- Key Management and Secret Sharing
- Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
- Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
- Privacy and Digital Rights
- The Swiss-Knife RFID Distance Bounding Protocol
- Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique
- Anonymous Fingerprinting for Predelivery of Contents
- Instruction Set Limitation in Support of Software Diversity
- Digital Signature and Voting
- Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
- How to Balance Privacy with Authenticity
- Efficient Vote Validity Check in Homomorphic Electronic Voting
- Side Channel Attack
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Novel PUF-Based Error Detection Methods in Finite State Machines
- Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
- Hash and MAC
- A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs
- Extended Models for Message Authentication
- A Preimage Attack for 52-Step HAS-160
- Primitives and Foundations
- Essentially Optimal Universally Composable Oblivious Transfer
- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
- Proving a Shuffle Using Representations of the Symmetric Group
- On Formal Verification of Arithmetic-Based Cryptographic Primitives
- Block and Stream
- A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent
- Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis
- Higher Order Differential Attacks on Reduced-Round MISTY1.