My Account Log in

1 option

Information Security and Cryptoloy - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers / edited by Pil Joong Lee, Jung Hee Cheon.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024)
Format:
Book
Contributor:
Lee, Pil Joong, editor.
Cheon, Jung Hee, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 5461.
Security and Cryptology ; 5461
Language:
English
Subjects (All):
Data encryption (Computer science).
Coding theory.
Information theory.
Computer science--Mathematics.
Computer science.
Computer security.
Management information systems.
Algorithms.
Cryptology.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Local Subjects:
Cryptology.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Physical Description:
1 online resource (XIII, 433 pages).
Edition:
First edition 2009.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.
Contents:
Public Key Encryption
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
Distributed Attribute-Based Encryption
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
Simple Algorithms for Computing a Sequence of 2-Isogenies
Key Management and Secret Sharing
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
Privacy and Digital Rights
The Swiss-Knife RFID Distance Bounding Protocol
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique
Anonymous Fingerprinting for Predelivery of Contents
Instruction Set Limitation in Support of Software Diversity
Digital Signature and Voting
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
How to Balance Privacy with Authenticity
Efficient Vote Validity Check in Homomorphic Electronic Voting
Side Channel Attack
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
Novel PUF-Based Error Detection Methods in Finite State Machines
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
Hash and MAC
A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs
Extended Models for Message Authentication
A Preimage Attack for 52-Step HAS-160
Primitives and Foundations
Essentially Optimal Universally Composable Oblivious Transfer
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Proving a Shuffle Using Representations of the Symmetric Group
On Formal Verification of Arithmetic-Based Cryptographic Primitives
Block and Stream
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent
Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis
Higher Order Differential Attacks on Reduced-Round MISTY1.
Other Format:
Printed edition:
ISBN:
978-3-642-00730-9
9783642007309
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account