Description |
1 online resource |
Series |
Lecture notes in computer science, 0302-9743 ; 7631 |
|
Lecture notes in computer science ; 7631.
|
Contents |
Model-Based Conformance Testing for Android / Yiming Jing, Gail-Joon Ahn and Hongxin Hu -- Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography / Takanori Yasuda, Tsuyoshi Takagi and Kouichi Sakurai -- Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU / Chien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling and Axel Poschmann, et al. -- Very Short Critical Path Implementation of AES with Direct Logic Gates / Kenta Nekado, Yasuyuki Nogami and Kengo Iokibe -- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary / Kazuki Yoneyama -- Compact Stateful Encryption Schemes with Ciphertext Verifiability / S. Sree Vivek, S. Sharmila Deva Selvi and C. Pandu Rangan -- Structured Encryption for Conceptual Graphs / Geong Sen Poh, Moesfa Soeheila Mohamad and Muhammad Reza Z'aba -- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability / Akinori Kawachi, Hirotoshi Takebe and Keisuke Tanaka -- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI / Takanori Isobe, Toshihiro Ohigashi and Masakatu Morii -- Boomerang Distinguishers for Full HAS-160 Compression Function / Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama and Kazuo Ohta -- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function / Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta -- Annihilators of Fast Discrete Fourier Spectra Attacks / Jingjing Wang, Kefei Chen and Shixiong Zhu -- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher / Jiqiang Lu, Yongzhuang Wei, Enes Pasalic and Pierre-Alain Fouque -- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security / Susumu Kiyoshima, Yoshifumi Manabe and Tatsuaki Okamoto -- Efficient Secure Primitive for Privacy Preserving Distributed Computations / Youwen Zhu, Tsuyoshi Takagi and Liusheng Huang -- Generic Construction of GUC Secure Commitment in the KRK Model / Itsuki Suzuki, Maki Yoshida and Toru Fujiwara |
Summary |
This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data protection |
|
Data encryption (Computer science) |
|
Computer software |
|
Computational complexity |
|
Systems and Data Security |
|
Management of Computing and Information Systems |
Bibliography |
Includes bibliographical references |
Subject |
Computer security -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Informatique.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
Conference papers and proceedings
|
|
Software.
|
Form |
Electronic book
|
Author |
Hanaoka, Goichiro.
|
|
Yamauchi, Toshihiro (Computer scientist)
|
ISBN |
9783642341175 |
|
3642341179 |
|
3642341160 |
|
9783642341168 |
|