Information Security and Cryptology - ICISC 2009 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers /

ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 2–4, 2009. It was - ganized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS). The aim of...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Lee, Donghoon. (Editor, http://id.loc.gov/vocabulary/relators/edt), Hong, Seokhie. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edition:1st ed. 2010.
Series:Security and Cryptology ; 5984
Subjects:
Online Access:https://doi.org/10.1007/978-3-642-14423-3
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Key Management and Key Exchange
  • Generic One Round Group Key Exchange in the Standard Model
  • Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
  • Efficient Certificateless KEM in the Standard Model
  • Public Key Cryptography
  • Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing
  • Factoring Unbalanced Moduli with Known Bits
  • Algebraic Cryptanalysis and Stream Cipher
  • Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared
  • MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals
  • Improved Linear Cryptanalysis of SOSEMANUK
  • Security Management and Efficient Implementation
  • Serial Model for Attack Tree Computations
  • Lightweight Cryptography and RFID: Tackling the Hidden Overheads
  • Side Channel Attack
  • Power Analysis of Single-Rail Storage Elements as Used in MDPL
  • A Timing Attack against Patterson Algorithm in the McEliece PKC
  • Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
  • Privacy Enhanced Technology
  • First CPIR Protocol with Data-Dependent Computation
  • Efficient Fuzzy Matching and Intersection on Private Datasets
  • Efficient Privacy-Preserving Face Recognition
  • Cryptographic Protocol
  • Linear, Constant-Rounds Bit-Decomposition
  • Attacking and Repairing the Improved ModOnions Protocol
  • Secret Handshakes with Revocation Support
  • Cryptanalysis of Hash Function
  • Practical Rebound Attack on 12-Round Cheetah-256
  • Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash
  • Improved Preimage Attack for 68-Step HAS-160
  • Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1
  • Network Security
  • Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
  • Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth.