Information Security and Cryptology
7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers
Herausgegeben:Wu, Chuan-Kun; Yung, Moti; Lin, Dongdai
Information Security and Cryptology
7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers
Herausgegeben:Wu, Chuan-Kun; Yung, Moti; Lin, Dongdai
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.
Andere Kunden interessierten sich auch für
- Howard Heys / Carlisle Adams (eds.)Selected Areas in Cryptography38,99 €
- Advances in Cryptology - ASIACRYPT 201042,99 €
- Advances in Cryptology -- ASIACRYPT 201576,99 €
- Advances in Cryptology - ASIACRYPT 201540,99 €
- Steven Galbraith (ed.)Cryptography and Coding38,99 €
- Nigel Smart (ed.)Cryptography and Coding41,99 €
- Coding and Cryptology38,99 €
-
-
-
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 7537
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-642-34703-0
- 2012
- Seitenzahl: 404
- Erscheinungstermin: 16. Oktober 2012
- Englisch
- Abmessung: 235mm x 155mm x 22mm
- Gewicht: 616g
- ISBN-13: 9783642347030
- ISBN-10: 3642347037
- Artikelnr.: 36640931
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 7537
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-642-34703-0
- 2012
- Seitenzahl: 404
- Erscheinungstermin: 16. Oktober 2012
- Englisch
- Abmessung: 235mm x 155mm x 22mm
- Gewicht: 616g
- ISBN-13: 9783642347030
- ISBN-10: 3642347037
- Artikelnr.: 36640931
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.
to Public-Key Encryption with Non-interactive Opening.- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves.- Weak-Key Class of MISTY1 for Related-Key Differential Attack.- Cryptanalysis of Reduced-Round KLEIN Block Cipher.- An Efficient RSA Implementation without Precomputation.- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures.- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation.- Towards Attack Resilient Social Network Based Threshold Signing.- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems.- Cryptanalysis vs. Provable Security.- Boosting Scalability in Anomaly-Based Packed Executable Filtering.- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs.- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming.- Adleman-Manders-Miller Root Extraction Method Revisited.- Multi-pixel Encryption Visual Cryptography.- An Improved Electronic Voting Scheme without a Trusted Random Number Generator.- Fault Attacks against the Miller Algorithm in Hessian Coordinates.- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion.- Improved Tradeoff between Encapsulation and Decapsulation of HK09.- Non-interactive Deniable Authentication Protocols.- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3.- Efficient Self-certified Signatures with Batch Verification.- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves.- Weak-Key Class of MISTY1 for Related-Key Differential Attack.- Cryptanalysis of Reduced-Round KLEIN Block Cipher.- An Efficient RSA Implementation without Precomputation.- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures.- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation.- Towards Attack Resilient Social Network Based Threshold Signing.- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.
to Public-Key Encryption with Non-interactive Opening.- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves.- Weak-Key Class of MISTY1 for Related-Key Differential Attack.- Cryptanalysis of Reduced-Round KLEIN Block Cipher.- An Efficient RSA Implementation without Precomputation.- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures.- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation.- Towards Attack Resilient Social Network Based Threshold Signing.- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems.- Cryptanalysis vs. Provable Security.- Boosting Scalability in Anomaly-Based Packed Executable Filtering.- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs.- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming.- Adleman-Manders-Miller Root Extraction Method Revisited.- Multi-pixel Encryption Visual Cryptography.- An Improved Electronic Voting Scheme without a Trusted Random Number Generator.- Fault Attacks against the Miller Algorithm in Hessian Coordinates.- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion.- Improved Tradeoff between Encapsulation and Decapsulation of HK09.- Non-interactive Deniable Authentication Protocols.- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3.- Efficient Self-certified Signatures with Batch Verification.- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves.- Weak-Key Class of MISTY1 for Related-Key Differential Attack.- Cryptanalysis of Reduced-Round KLEIN Block Cipher.- An Efficient RSA Implementation without Precomputation.- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures.- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation.- Towards Attack Resilient Social Network Based Threshold Signing.- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.