𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information Security and Cryptology - ICISC 2007: 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings

✍ Scribed by Willi Geiselmann, Rainer Steinwandt (auth.), Kil-Hyun Nam, Gwangsoo Rhee (eds.)


Publisher
Springer
Year
2007
Tongue
English
Leaves
370
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Front Matter....Pages -
Cryptanalysis of a Hash Function Proposed at ICISC 2006....Pages 1-10
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006....Pages 11-26
A Cryptanalysis of the Double-Round Quadratic Cryptosystem....Pages 27-36
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment....Pages 37-48
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments....Pages 49-63
Handling Dynamic Information Release....Pages 64-76
Improving the Time Complexity of Matsui’s Linear Cryptanalysis....Pages 77-88
On Large Distributions for Linear Cryptanalysis....Pages 89-101
Passive Attacks on a Class of Authentication Protocols for RFID....Pages 102-115
Side Channel Attacks on Irregularly Decimated Generators....Pages 116-130
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module....Pages 131-143
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences....Pages 144-155
A Secure Virtual Execution Environment for Untrusted Code....Pages 156-167
Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum....Pages 168-179
Improving Upon the TET Mode of Operation....Pages 180-192
New Local Collisions for the SHA-2 Hash Family....Pages 193-205
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL....Pages 206-226
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4....Pages 227-238
New Results on Impossible Differential Cryptanalysis of Reduced AES....Pages 239-250
A Note About the Traceability Properties of Linear Codes....Pages 251-258
Power Analysis Attacks on MDPL and DRSL Implementations....Pages 259-272
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier....Pages 273-281
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA....Pages 282-296
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon’s Algorithm....Pages 297-308
Analysis of Multivariate Hash Functions....Pages 309-323
Colliding Message Pair for 53-Step HAS-160....Pages 324-334
Weaknesses in the HAS-V Compression Function....Pages 335-345
Security-Preserving Asymmetric Protocol Encapsulation....Pages 346-366
Back Matter....Pages -

✦ Subjects


Computer Communication Networks


πŸ“œ SIMILAR VOLUMES


Information Security and Cryptology β€” IC
✍ Serge Lefranc, David Naccache (auth.), Pil Joong Lee, Chae Hoon Lim (eds.) πŸ“‚ Library πŸ“… 2003 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><P> This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.</P><P>The 35 revised full papers presented together with an invited paper were carefully selected from

Information Security and Cryptology – IC
✍ Serge Vaudenay (auth.), Min Surp Rhee, Byoungcheon Lee (eds.) πŸ“‚ Library πŸ“… 2006 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<P>This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006.</P> <P>The 26 revised full papers presented together with two invited talks have gone through two rounds of revie

Information Security and Cryptology – IC
✍ Min Surp Rhee (editor), Byoungcheon Lee (editor) πŸ“‚ Library πŸ“… 2006 πŸ› Springer 🌐 English

<p><span>This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006. The 26 revised full papers cover such topics as hash functions, block and stream ciphers, network security a

Information Security and Cryptology β€” IC
✍ David Pointcheval (auth.), Kwangjo Kim (eds.) πŸ“‚ Library πŸ“… 2002 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6–7, 2001. The 63 Building, consisting of 60 stories above the gro

Information Security and Cryptology - IC
✍ Jonathan Katz (auth.), Jong-In Lim, Dong-Hoon Lee (eds.) πŸ“‚ Library πŸ“… 2004 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.</P><P></P><P>The 32 revised full papers presented together with an invited paper were carefully selecte