Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings / [electronic resource] : edited by Kil-Hyun Nam, Gwangsoo Rhee. - Berlin, Heidelberg : Springer Berlin Heidelberg, 2007. - XIII, 370 p. online resource. - Lecture Notes in Computer Science, 4817 0302-9743 ; . - Lecture Notes in Computer Science, 4817 .

Cryptanalysis – I -- Cryptanalysis of a Hash Function Proposed at ICISC 2006 -- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 -- A Cryptanalysis of the Double-Round Quadratic Cryptosystem -- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment -- Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments -- Handling Dynamic Information Release -- Cryptanalysis – II -- Improving the Time Complexity of Matsui’s Linear Cryptanalysis -- On Large Distributions for Linear Cryptanalysis -- Passive Attacks on a Class of Authentication Protocols for RFID -- Side Channel Attacks on Irregularly Decimated Generators -- Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module -- Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences -- A Secure Virtual Execution Environment for Untrusted Code -- Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum -- Improving Upon the TET Mode of Operation -- Hash Functions – I -- New Local Collisions for the SHA-2 Hash Family -- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL -- Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4 -- New Results on Impossible Differential Cryptanalysis of Reduced AES -- A Note About the Traceability Properties of Linear Codes -- Power Analysis Attacks on MDPL and DRSL Implementations -- Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier -- Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA -- Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon’s Algorithm -- Hash Functions – II -- Analysis of Multivariate Hash Functions -- Colliding Message Pair for 53-Step HAS-160 -- Weaknesses in the HAS-V Compression Function -- Security-Preserving Asymmetric Protocol Encapsulation.

9783540767886

10.1007/978-3-540-76788-6 doi


Computer science.
Computer Communication Networks.
Data protection.
Data encryption (Computer science).
Computer software.
Computational complexity.
Information Systems.
Computer Science.
Data Encryption.
Discrete Mathematics in Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.

QA76.9.A25

005.82
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha