Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers /

ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 2–4, 2009. It was - ganized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS). The aim of...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Lee, Donghoon (Editor), Hong, Seokhie (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Series:Lecture Notes in Computer Science, 5984
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Key Management and Key Exchange
  • Generic One Round Group Key Exchange in the Standard Model
  • Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
  • Efficient Certificateless KEM in the Standard Model
  • Public Key Cryptography
  • Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing
  • Factoring Unbalanced Moduli with Known Bits
  • Algebraic Cryptanalysis and Stream Cipher
  • Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared
  • MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals
  • Improved Linear Cryptanalysis of SOSEMANUK
  • Security Management and Efficient Implementation
  • Serial Model for Attack Tree Computations
  • Lightweight Cryptography and RFID: Tackling the Hidden Overheads
  • Side Channel Attack
  • Power Analysis of Single-Rail Storage Elements as Used in MDPL
  • A Timing Attack against Patterson Algorithm in the McEliece PKC
  • Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
  • Privacy Enhanced Technology
  • First CPIR Protocol with Data-Dependent Computation
  • Efficient Fuzzy Matching and Intersection on Private Datasets
  • Efficient Privacy-Preserving Face Recognition
  • Cryptographic Protocol
  • Linear, Constant-Rounds Bit-Decomposition
  • Attacking and Repairing the Improved ModOnions Protocol
  • Secret Handshakes with Revocation Support
  • Cryptanalysis of Hash Function
  • Practical Rebound Attack on 12-Round Cheetah-256
  • Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash
  • Improved Preimage Attack for 68-Step HAS-160
  • Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1
  • Network Security
  • Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
  • Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth.