Limit search to available items
Book Cover
E-book
Author International Workshop on Security (10th : 2015 : Nara-shi, Japan)

Title Advances in information and computer security : 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings / Keisuke Tanaka, Yuji Suga (eds.)
Published Cham : Springer, 2015

Copies

Description 1 online resource (xiii, 357 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 9241
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 9241. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; Preface; IWSEC 2015 10th International Workshop on Security; Contents; Identity-Based Encryption; Identity-Based Lossy Encryption from Learning with Errors; 1 Introduction; 1.1 Background; 1.2 Our Contributions; 1.3 Related Work; 1.4 Organization; 2 Preliminaries; 2.1 Notations; 2.2 Min-Entropy; 2.3 Learning with Errors; 2.4 Discrete Gaussians; 2.5 Lossy Encryption; 2.6 Some Results About Randomness; 3 Identity-Based Lossy Encryption; 3.1 Selective Opening Security; 3.2 Construction from LWE; 4 Conclusion; References; Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
1 Introduction2 Preliminaries; 3 Revocable Hierarchical Identity-Based Encryption; 4 Proposed Adaptive-ID Secure RHIBE; 5 Conclusion; References; Elliptic Curve Cryptography; Invalid Curve Attacks in a GLS Setting; 1 Introduction; 2 Preliminaries; 3 Invalid Curve Attack on GLS Scalar Multiplication; 4 Complexity Analysis; 5 Implementations; 6 Conclusion; A Computation of (u) on u [1, 3]; References; New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates; 1 Introduction; 2 Preliminary; 3 Speeding up Some Elliptic Curve Operations in Affine Coordinates; 4 Comparisons
4.1 Point Operations4.2 Scalar Multiplications; 5 Conclusions; References; Factoring; Implicit Factorization of RSA Moduli Revisited (Short Paper); 1 Introduction; 2 Preliminaries; 3 Previous Method of Factoring Two RSA Moduli with Implicitly Common Middle Bits; 4 Our Improvement; 5 Conclusion; References; Symmetric Cryptanalysis; Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions; 1 Introduction; 2 The Hash Function Family; 3 Improved Preimage Attacks on Reduced-Round GOST
3.1 Overview of the Preimage Attack on 5-Round GOST-2563.2 Phase 1. Construct the Multicollisions; 3.3 Phase 2. Invert the Output Transformation; 3.4 Phase 3. Generate the Preimage; 3.5 Summarize the 5-Round Attack; 3.6 Extend the Preimage Attack to More Rounds; 4 Conclusion and Open Problems; References; Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s; 1 Introduction; 2 MILP Based Framework for Automatic Differential Cryptanalysis; 3 Techniques for Obtaining Better Characteristics
4 Application to DESL and LBlock-s4.1 Improved Single-Key and Related-Key Differential Characteristics for DESL; 4.2 Tighter Security Bound for LBlock-s; 5 Conclusion and Discussion; References; Provable Security; NM-CPA Secure Encryption with Proofs of Plaintext Knowledge; 1 Introduction; 2 Preliminaries; 2.1 Public Key Encryption; 2.2 Proofs of Knowledge; 3 Our Scheme; 4 Security Proof; 5 Applications: Electronic Voting; 5.1 Election Schemes; 5.2 Sufficient Conditions for Ballot Secrecy; 5.3 Towards a Secure Variant of Helios; 6 Related Work; 7 Conclusion; A Proof of Theorem 1
Summary This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware
Analysis computerwetenschappen
computer sciences
wiskunde
mathematics
algoritmen
algorithms
computeranalyse
computer analysis
gegevensbeheer
data management
computernetwerken
computer networks
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes International conference proceedings
Includes author index
English
Online resource; title from PDF title page (SpringerLink, viewed August 24, 2015)
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Data encryption.
Discrete mathematics.
Algorithms & data structures.
Network hardware.
Computer security.
Computers -- Security -- General.
Computers -- Data Processing.
Computers -- Programming -- Algorithms.
Computers -- Hardware -- Network Hardware.
Computer security
Data encryption (Computer science)
Genre/Form Conference papers and proceedings
Form Electronic book
Author Tanaka, Keisuke (Associate professor), editor.
Suga, Yuji, editor.
ISBN 9783319224251
3319224255
3319224247
9783319224244
Other Titles IWSEC 2015