Ebook: Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers
- Tags: Computer Communication Networks, Data Encryption, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Systems and Data Security, Computers and Society
- Series: Lecture Notes in Computer Science 6151
- Year: 2011
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on cryptanalysis; signature and signcryption; key exchange; private computations; cipher design and analysis; public key cryptography; network and system security; hardware security; and web security.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on cryptanalysis; signature and signcryption; key exchange; private computations; cipher design and analysis; public key cryptography; network and system security; hardware security; and web security.
Content:
Front Matter....Pages -
Integral Cryptanalysis of ARIA....Pages 1-14
Cryptanalysis of the ESSENCE Family of Hash Functions....Pages 15-34
Differential-Multiple Linear Cryptanalysis....Pages 35-49
Differential Attack on Five Rounds of the SC2000 Block Cipher....Pages 50-59
Pairing-Based Nominative Signatures with Selective and Universal Convertibility....Pages 60-74
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing....Pages 75-92
Sanitizable Signatures with Strong Transparency in the Standard Model....Pages 93-107
Breaking and Building of Threshold Signcryption Schemes....Pages 108-123
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption....Pages 124-133
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network....Pages 134-143
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework....Pages 144-153
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication....Pages 154-163
Optionally Identifiable Private Handshakes....Pages 164-178
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience....Pages 179-197
Gemstone: A New Stream Cipher Using Coupled Map Lattice....Pages 198-214
Proposition of Two Cipher Structures....Pages 215-229
Hardware Framework for the Rabbit Stream Cipher....Pages 230-247
Linearity within the SMS4 Block Cipher....Pages 248-265
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages....Pages 266-277
Weak Keys in RSA with Primes Sharing Least Significant Bits....Pages 278-287
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption....Pages 288-302
Constructing Better KEMs with Partial Message Recovery....Pages 303-312
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms....Pages 313-323
Remodeling Vulnerability Information....Pages 324-336
Using Strategy Objectives for Network Security Analysis....Pages 337-349
A DAA Scheme Requiring Less TPM Resources....Pages 350-365
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags....Pages 366-382
Weaknesses in Two Recent Lightweight RFID Authentication Protocols....Pages 383-392
Algebraic Side-Channel Attacks....Pages 393-410
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing....Pages 411-425
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents....Pages 426-442
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints....Pages 443-457
Back Matter....Pages -
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on cryptanalysis; signature and signcryption; key exchange; private computations; cipher design and analysis; public key cryptography; network and system security; hardware security; and web security.
Content:
Front Matter....Pages -
Integral Cryptanalysis of ARIA....Pages 1-14
Cryptanalysis of the ESSENCE Family of Hash Functions....Pages 15-34
Differential-Multiple Linear Cryptanalysis....Pages 35-49
Differential Attack on Five Rounds of the SC2000 Block Cipher....Pages 50-59
Pairing-Based Nominative Signatures with Selective and Universal Convertibility....Pages 60-74
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing....Pages 75-92
Sanitizable Signatures with Strong Transparency in the Standard Model....Pages 93-107
Breaking and Building of Threshold Signcryption Schemes....Pages 108-123
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption....Pages 124-133
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network....Pages 134-143
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework....Pages 144-153
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication....Pages 154-163
Optionally Identifiable Private Handshakes....Pages 164-178
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience....Pages 179-197
Gemstone: A New Stream Cipher Using Coupled Map Lattice....Pages 198-214
Proposition of Two Cipher Structures....Pages 215-229
Hardware Framework for the Rabbit Stream Cipher....Pages 230-247
Linearity within the SMS4 Block Cipher....Pages 248-265
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages....Pages 266-277
Weak Keys in RSA with Primes Sharing Least Significant Bits....Pages 278-287
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption....Pages 288-302
Constructing Better KEMs with Partial Message Recovery....Pages 303-312
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms....Pages 313-323
Remodeling Vulnerability Information....Pages 324-336
Using Strategy Objectives for Network Security Analysis....Pages 337-349
A DAA Scheme Requiring Less TPM Resources....Pages 350-365
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags....Pages 366-382
Weaknesses in Two Recent Lightweight RFID Authentication Protocols....Pages 383-392
Algebraic Side-Channel Attacks....Pages 393-410
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing....Pages 411-425
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents....Pages 426-442
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints....Pages 443-457
Back Matter....Pages -
....
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on cryptanalysis; signature and signcryption; key exchange; private computations; cipher design and analysis; public key cryptography; network and system security; hardware security; and web security.
Content:
Front Matter....Pages -
Integral Cryptanalysis of ARIA....Pages 1-14
Cryptanalysis of the ESSENCE Family of Hash Functions....Pages 15-34
Differential-Multiple Linear Cryptanalysis....Pages 35-49
Differential Attack on Five Rounds of the SC2000 Block Cipher....Pages 50-59
Pairing-Based Nominative Signatures with Selective and Universal Convertibility....Pages 60-74
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing....Pages 75-92
Sanitizable Signatures with Strong Transparency in the Standard Model....Pages 93-107
Breaking and Building of Threshold Signcryption Schemes....Pages 108-123
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption....Pages 124-133
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network....Pages 134-143
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework....Pages 144-153
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication....Pages 154-163
Optionally Identifiable Private Handshakes....Pages 164-178
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience....Pages 179-197
Gemstone: A New Stream Cipher Using Coupled Map Lattice....Pages 198-214
Proposition of Two Cipher Structures....Pages 215-229
Hardware Framework for the Rabbit Stream Cipher....Pages 230-247
Linearity within the SMS4 Block Cipher....Pages 248-265
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages....Pages 266-277
Weak Keys in RSA with Primes Sharing Least Significant Bits....Pages 278-287
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption....Pages 288-302
Constructing Better KEMs with Partial Message Recovery....Pages 303-312
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms....Pages 313-323
Remodeling Vulnerability Information....Pages 324-336
Using Strategy Objectives for Network Security Analysis....Pages 337-349
A DAA Scheme Requiring Less TPM Resources....Pages 350-365
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags....Pages 366-382
Weaknesses in Two Recent Lightweight RFID Authentication Protocols....Pages 383-392
Algebraic Side-Channel Attacks....Pages 393-410
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing....Pages 411-425
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents....Pages 426-442
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints....Pages 443-457
Back Matter....Pages -
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on cryptanalysis; signature and signcryption; key exchange; private computations; cipher design and analysis; public key cryptography; network and system security; hardware security; and web security.
Content:
Front Matter....Pages -
Integral Cryptanalysis of ARIA....Pages 1-14
Cryptanalysis of the ESSENCE Family of Hash Functions....Pages 15-34
Differential-Multiple Linear Cryptanalysis....Pages 35-49
Differential Attack on Five Rounds of the SC2000 Block Cipher....Pages 50-59
Pairing-Based Nominative Signatures with Selective and Universal Convertibility....Pages 60-74
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing....Pages 75-92
Sanitizable Signatures with Strong Transparency in the Standard Model....Pages 93-107
Breaking and Building of Threshold Signcryption Schemes....Pages 108-123
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption....Pages 124-133
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network....Pages 134-143
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework....Pages 144-153
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication....Pages 154-163
Optionally Identifiable Private Handshakes....Pages 164-178
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience....Pages 179-197
Gemstone: A New Stream Cipher Using Coupled Map Lattice....Pages 198-214
Proposition of Two Cipher Structures....Pages 215-229
Hardware Framework for the Rabbit Stream Cipher....Pages 230-247
Linearity within the SMS4 Block Cipher....Pages 248-265
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages....Pages 266-277
Weak Keys in RSA with Primes Sharing Least Significant Bits....Pages 278-287
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption....Pages 288-302
Constructing Better KEMs with Partial Message Recovery....Pages 303-312
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms....Pages 313-323
Remodeling Vulnerability Information....Pages 324-336
Using Strategy Objectives for Network Security Analysis....Pages 337-349
A DAA Scheme Requiring Less TPM Resources....Pages 350-365
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags....Pages 366-382
Weaknesses in Two Recent Lightweight RFID Authentication Protocols....Pages 383-392
Algebraic Side-Channel Attacks....Pages 393-410
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing....Pages 411-425
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents....Pages 426-442
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints....Pages 443-457
Back Matter....Pages -
....
Download the book Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)