Information Security and Cryptology - ICISC 2007
Springer Berlin (Verlag)
978-3-540-76787-9 (ISBN)
Cryptanalysis - I.- Cryptanalysis of a Hash Function Proposed at ICISC 2006.- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006.- A Cryptanalysis of the Double-Round Quadratic Cryptosystem.- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment.- Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments.- Handling Dynamic Information Release.- Cryptanalysis - II.- Improving the Time Complexity of Matsui's Linear Cryptanalysis.- On Large Distributions for Linear Cryptanalysis.- Passive Attacks on a Class of Authentication Protocols for RFID.- Side Channel Attacks on Irregularly Decimated Generators.- Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module.- Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences.- A Secure Virtual Execution Environment for Untrusted Code.- Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum.- Improving Upon the TET Mode of Operation.- Hash Functions - I.- New Local Collisions for the SHA-2 Hash Family.- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.- Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4.- New Results on Impossible Differential Cryptanalysis of Reduced AES.- A Note About the Traceability Properties of Linear Codes.- Power Analysis Attacks on MDPL and DRSL Implementations.- Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.- Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA.- Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm.- Hash Functions - II.- Analysis of Multivariate HashFunctions.- Colliding Message Pair for 53-Step HAS-160.- Weaknesses in the HAS-V Compression Function.- Security-Preserving Asymmetric Protocol Encapsulation.
Erscheint lt. Verlag | 16.11.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 370 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 569 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Algorithm analysis and problem complexity • algorithms • authentication • biomerics • Block Ciphers • Code • Collision • Complexity • Cryptanalysis • cryptographic algorithhms • Cryptographic Attacks • cryptographic primitives • cryptographic protocols • cryptography • Cryptology • Cryptosystems • data encryption • Data Security • digital right • Digital rights management • Digital Signature Systems • elliptic curve cryptosystems • Hash Functions • Information • Information Security • Internet Security • Intrusion Detection • Mobile Security • Network Security • Public Key Cryptography • Radio-Frequency Identification (RFID) • rsa • Secure Communications • secure RFID schemes • security • Stream Ciphers • Systems Security • ubiquitous computing |
ISBN-10 | 3-540-76787-8 / 3540767878 |
ISBN-13 | 978-3-540-76787-9 / 9783540767879 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich