Information Security and Cryptology
8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
(Sprache: Englisch)
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012.
The 23 revised full papers presented were...
The 23 revised full papers presented were...
Voraussichtlich lieferbar in 3 Tag(en)
versandkostenfrei
Buch (Kartoniert)
53.49 €
Produktdetails
Produktinformationen zu „Information Security and Cryptology “
Klappentext zu „Information Security and Cryptology “
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.
Inhaltsverzeichnis zu „Information Security and Cryptology “
On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown.- Differential Fault Analysis of Twofish.- Improved Differential Cache Attacks on SMS4.- An Extension of Fault Sensitivity Analysis Based on Clockwise Collision.- A Robust Fuzzy Extractor without ECCs.- An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels.- Visual Cryptography for Natural Images and Visual Voting.- RCCA Security for KEM+DEM Style Hybrid Encryptions.- Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations.- Verifiable Structured Encryption.- Nested Merkle's Puzzles against Sampling Attacks (Extended Abstract).- Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.- A General Model for MAC Generation Using Direct Injection.- Collision Attacks on Variant of OCB Mode and Its Series.- The Security andPerformance of "GCM" when Short Multiplications Are Used Instead.- Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN.- Fast Evaluation of T-Functions via Time-Memory Trade-Offs.- Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks.- An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators.- New Sequences of Period pn and pn + 1 via Projective Linear Groups.- Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones.- Secure Product Tracking in Supply Chain.- The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks.
Autoren-Porträt
Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.
Bibliographische Angaben
- 2013, 393 Seiten, Maße: 15,4 x 23,8 cm, Kartoniert (TB), Englisch
- Herausgegeben: Miroslaw Kutylowski, Moti Yung
- Verlag: Springer, Berlin
- ISBN-10: 3642385184
- ISBN-13: 9783642385186
Sprache:
Englisch
Kommentar zu "Information Security and Cryptology"
0 Gebrauchte Artikel zu „Information Security and Cryptology“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Information Security and Cryptology".
Kommentar verfassen