Limit search to available items
Book Cover
E-book
Author International Workshop on Security (7th : 2012 : Fukuoka-ken, Japan)

Title Advances in information and computer security : 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings / Goichiro Hanaoka, Toshihiro Yamauchi (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7631
Lecture notes in computer science ; 7631.
Contents Model-Based Conformance Testing for Android / Yiming Jing, Gail-Joon Ahn and Hongxin Hu -- Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography / Takanori Yasuda, Tsuyoshi Takagi and Kouichi Sakurai -- Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU / Chien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling and Axel Poschmann, et al. -- Very Short Critical Path Implementation of AES with Direct Logic Gates / Kenta Nekado, Yasuyuki Nogami and Kengo Iokibe -- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary / Kazuki Yoneyama -- Compact Stateful Encryption Schemes with Ciphertext Verifiability / S. Sree Vivek, S. Sharmila Deva Selvi and C. Pandu Rangan -- Structured Encryption for Conceptual Graphs / Geong Sen Poh, Moesfa Soeheila Mohamad and Muhammad Reza Z'aba -- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability / Akinori Kawachi, Hirotoshi Takebe and Keisuke Tanaka -- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI / Takanori Isobe, Toshihiro Ohigashi and Masakatu Morii -- Boomerang Distinguishers for Full HAS-160 Compression Function / Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama and Kazuo Ohta -- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function / Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta -- Annihilators of Fast Discrete Fourier Spectra Attacks / Jingjing Wang, Kefei Chen and Shixiong Zhu -- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher / Jiqiang Lu, Yongzhuang Wei, Enes Pasalic and Pierre-Alain Fouque -- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security / Susumu Kiyoshima, Yoshifumi Manabe and Tatsuaki Okamoto -- Efficient Secure Primitive for Privacy Preserving Distributed Computations / Youwen Zhu, Tsuyoshi Takagi and Liusheng Huang -- Generic Construction of GUC Secure Commitment in the KRK Model / Itsuki Suzuki, Maki Yoshida and Toru Fujiwara
Summary This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Systems and Data Security
Management of Computing and Information Systems
Bibliography Includes bibliographical references
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Informatique.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Hanaoka, Goichiro.
Yamauchi, Toshihiro (Computer scientist)
ISBN 9783642341175
3642341179
3642341160
9783642341168
Other Titles IWSEC 2012