Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers /
ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 2–4, 2009. It was - ganized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS). The aim of...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Σειρά: | Lecture Notes in Computer Science,
5984 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Key Management and Key Exchange
- Generic One Round Group Key Exchange in the Standard Model
- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
- Efficient Certificateless KEM in the Standard Model
- Public Key Cryptography
- Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing
- Factoring Unbalanced Moduli with Known Bits
- Algebraic Cryptanalysis and Stream Cipher
- Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared
- MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals
- Improved Linear Cryptanalysis of SOSEMANUK
- Security Management and Efficient Implementation
- Serial Model for Attack Tree Computations
- Lightweight Cryptography and RFID: Tackling the Hidden Overheads
- Side Channel Attack
- Power Analysis of Single-Rail Storage Elements as Used in MDPL
- A Timing Attack against Patterson Algorithm in the McEliece PKC
- Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
- Privacy Enhanced Technology
- First CPIR Protocol with Data-Dependent Computation
- Efficient Fuzzy Matching and Intersection on Private Datasets
- Efficient Privacy-Preserving Face Recognition
- Cryptographic Protocol
- Linear, Constant-Rounds Bit-Decomposition
- Attacking and Repairing the Improved ModOnions Protocol
- Secret Handshakes with Revocation Support
- Cryptanalysis of Hash Function
- Practical Rebound Attack on 12-Round Cheetah-256
- Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash
- Improved Preimage Attack for 68-Step HAS-160
- Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1
- Network Security
- Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
- Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth.