Limit search to available items
Book Cover
E-book
Author ICISC (Conference) (15th : 2012 : Seoul, Korea)

Title Information security and cryptology--ICISC 2012 : 15th International Conference, Seoul, Korea, November 28-30, 2012 : revised selected papers / Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon (eds.)
Published Berlin ; New York : Springer, ©2013

Copies

Description 1 online resource (xiv, 512 pages) : illustrations
Series Lecture notes in computer science, 1611-3349 ; 7839
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7839. 1611-3349
LNCS sublibrary. SL 4, Security and cryptology.
Contents Invited Papers. ML Confidential: Machine Learning on Encrypted Data / Thore Graepel, Kristin Lauter, Michael Naehrig -- Another Look at Affine-Padding RSA Signatures / Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi -- On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis / Christian Rechberger -- Attack and Defense. Balanced Indexing Method for Efficient Intrusion Detection Systems / BooJoong Kang [and others] -- Quantitative Questions on Attack-Defense Trees / Barbara Kordy, Sjouke Mauw, Patrick Schweitzer -- DNS Tunneling for Network Penetration / Daan Raman [and others] -- MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring / Lingguang Lei [and others] -- Software and Web Security. iBinHunt: Binary Hunting with Inter-procedural Control Flow / Jiang Ming, Meng Pan, Debin Gao -- Sometimes It's Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys / Christopher Meyer, Florian Feldmann, Jörg Schwenk
Cryptanalysis I. Improved Impossible Differential Attacks on Large-Block Rijndael / Qingju Wang [and others] -- Cube Cryptanalysis of LBlock with Noisy Leakage / Zhenqi Li [and others] -- Comprehensive Study of Integral Analysis on 22-Round LBlock / Yu Sasaki, Lei Wang -- New Impossible Differential Attack on SAFER+ and SAFER++ / Jingyuan Zhao [and others] -- Cryptographic Protocol. An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol / Christian L.F. Corniaux, Hossein Ghodosi -- Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms / Koki Hamada [and others] -- Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol / Lei Zhang -- Identity-Based Encryption. A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles / Kaitai Liang [and others] -- Ciphertext Policy Multi-dimensional Range Encryption / Kohei Kasamatsu [and others]
Efficient Implementation. Speeding Up Ate Pairing Computation in Affine Coordinates / Duc-Phong Le, Chik How Tan -- An Improved Hardware Implementation of the Grain-128a Stream Cipher / Shohreh Sharif Mansouri, Elena Dubrova -- Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers / Ayesha Khalid [and others] -- Cloud Computing Security. Trusted Launch of Virtual Machine Instances in Public IaaS Environments / Nicolae Paladi [and others] -- Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines / Michael Velten, Frederic Stumpf -- Cryptanalysis II. Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha / Zhenqing Shi [and others] -- Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties / Takuma Koyama, Yu Sasaki, Noboru Kunihiro -- Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers / Mohamed Ahmed Abdelraheem
Side Channel Analysis. Security Evaluation of Cryptographic Modules against Profiling Attacks / Yongdae Kim [and others] -- Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher / Toshiki Nakasone [and others] -- Digital Signature. Efficient Group Signatures in the Standard Model / Laila El Aimani, Olivier Sanders -- Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures / Keisuke Hakuta [and others] -- Linear Recurring Sequences for the UOV Key Generation Revisited / Albrecht Petzoldt, Stanislav Bulygin -- Galindo-Garcia Identity-Based Signature Revisited / Sanjit Chatterjee, Chethan Kamath, Vikas Kumar -- Privacy Enhancement. Private Over-Threshold Aggregation Protocols / Myungsun Kim [and others] -- An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard / Kyung-kug Kim, Myung-Hwan Kim -- Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System / Nasima Begum, Toru Nakanishi, Nobuo Funabiki
Summary This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement
Analysis Computer science
Data protection
Data encryption (Computer science)
Information Systems
Systems and Data Security
Management of Computing and Information Systems
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed May 23, 2013)
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer security.
Computer Security
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Kwon, Taekyoung.
Lee, Mun-Kyu
Kwon, Daesung
ISBN 9783642376825
3642376827
Other Titles ICISC 2012