Information security and cryptology-- ICISC 2011 [electronic resource] : 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised selected papers / Howon Kim (ed.)
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of re...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | |
Other title: | ICISC 2011. |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2012.
|
Series: | Lecture notes in computer science ;
7259. LNCS sublibrary. Security and cryptology. |
Subjects: |
Table of Contents:
- Improved Integral Analysis on Tweaked Lesamnta / Yu Sasaki and Kazumaro Aoki
- Analysis of Trivium Using Compressed Right Hand Side Equations / Thorsten Ernst Schilling and Håvard Raddum
- Cryptanalysis of Round-Reduced HAS-160 / Florian Mendel, Tomislav Nad and Martin Schläffer
- An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software / Daehyun Strobel and Christof Paar
- An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks / Hailong Zhang, Yongbin Zhou and Dengguo Feng
- Correcting Errors in Private Keys Obtained from Cold Boot Attacks / Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek and Jung Hee Cheon
- Strong Security Notions for Timed-Release Public-Key Encryption Revisited / Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto and Taiichi Saito
- Fully Secure Unidirectional Identity-Based Proxy Re-encryption / Song Luo, Qingni Shen and Zhong Chen
- Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition / Yong Qiao, Yuexiang Yang, Jie He, Bo Liu and Yingzhi Zeng
- AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability / Kai Chen, Yifeng Lian and Yingjun Zhang
- Weaknesses in Current RSA Signature Schemes / Juliane Krämer, Dmitry Nedospasov and Jean-Pierre Seifert.
- Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations / Shuguo Yang, Yongbin Zhou, Jiye Liu and Danyang Chen
- A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users / Keita Emura, Atsuko Miyaji and Kazumasa Omote
- Generic Constructions for Verifiable Signcryption / Laila El Aimani
- Non-delegatable Strong Designated Verifier Signature on Elliptic Curves / Haibo Tian, Xiaofeng Chen, Zhengtao Jiang and Yusong Du
- An Improved Known Plaintext Attack on PKZIP Encryption Algorithm / Kyung Chul Jeong, Dong Hoon Lee and Daewan Han
- Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit / Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding and Jianchun Jiang
- On the Resistance of Boolean Functions against Fast Algebraic Attacks / Yusong Du, Fangguo Zhang and Meicheng Liu
- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model / Yu Chen, Liqun Chen and Zongyang Zhang
- Design, Implementation, and Evaluation of a Vehicular Hardware Security Module / Marko Wolf and Timo Gendrullis
- Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection / Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd and Juan Gonzalez Nieto
- Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering / Paolo Palmieri and Olivier Pereira.
- Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing / Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida
- Biclique Attack on the Full HIGHT / Deukjo Hong, Bonwook Koo and Daesung Kwon
- Preimage Attacks on Step-Reduced SM3 Hash Function / Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su and Le Dong
- Breaking a 3D-Based CAPTCHA Scheme / Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo
- Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control / Fangming Zhao, Takashi Nishide and Kouichi Sakurai
- Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes / Zhenfei Zhang, Thomas Plantard and Willy Susilo
- A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval Arithmetic / Teruya Minamoto and Ryuji Ohura
- On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks / Ashish Choudhury and Arpita Patra
- Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles / Kazuki Yoneyama
- Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys / Atsushi Fujioka and Koutarou Suzuki.