Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Steinfeld, Ron (Επιμελητής έκδοσης), Hawkes, Philip (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6168
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Symmetric Key Encryption
  • Cryptanalysis of a Generalized Unbalanced Feistel Network Structure
  • Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
  • On Multidimensional Linear Cryptanalysis
  • Side-Channel Analysis of the K2 Stream Cipher
  • On Unbiased Linear Approximations
  • Hash Functions
  • Distinguishers for the Compression Function and Output Transformation of Hamsi-256
  • Second-Preimage Analysis of Reduced SHA-1
  • Some Observations on Indifferentiability
  • Public Key Cryptography
  • Adaptive and Composable Non-committing Encryptions
  • Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles
  • Strong Knowledge Extractors for Public-Key Encryption Schemes
  • A Multi-trapdoor Commitment Scheme from the RSA Assumption
  • Identity-Based Chameleon Hash Scheme without Key Exposure
  • The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
  • Security Estimates for Quadratic Field Based Cryptosystems
  • Solving Generalized Small Inverse Problems
  • Protocols
  • One-Time-Password-Authenticated Key Exchange
  • Predicate-Based Key Exchange
  • Attribute-Based Authenticated Key Exchange
  • Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping
  • Additive Combinatorics and Discrete Logarithm Based Range Protocols
  • Proof-of-Knowledge of Representation of Committed Value and Its Applications
  • Network Security
  • Pattern Recognition Techniques for the Classification of Malware Packers
  • Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.