Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers
- フォーマット:
- 電子ブック
- 責任表示:
- edited by Jooyoung Lee, Jongsung Kim
- 言語:
- 英語
- 出版情報:
- Cham : Springer International Publishing : Imprint: Springer, 2015
- 形態:
- XIII, 448 p. 83 illus
- 著者名:
- シリーズ名:
- Lecture Notes in Computer Science ; 8949
- 目次情報:
-
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA On the Security of Distributed Multiprime RSA Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1 Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks A Fast Phase-Based Enumeration Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors How Much Can Complexity of Linear Cryptanalysis Be Reduced? Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers Bicliques with Minimal Data and Time Complexity for AES Fault Analysis on SIMON Family of Lightweight Block Ciphers A Clustering Approach for Privacy-Preserving in Social Networks Securely Solving Classical Network Flow Problems Remote IP Protection Using Timing Channels Detecting Camouflaged Applications on Mobile Application Markets WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 LSH: A New Fast Secure Hash Function Family Lossless Data Hiding for Binary Document Images Using n-Pairs Pattern Montgomery Modular Multiplication on ARM-NEON Revisited A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols Compact and Efficient UC Commitments Under Atomic-Exchanges Issuer-Free Adaptive Oblivious Transfer with Access Policy Memory Address Side-Channel Analysis on Exponentiation Mutant Differential Fault Analysis of Trivium MDFA General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA On the Security of Distributed Multiprime RSA Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1 Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks - 書誌ID:
- LB00386169
- ISBN:
- 9783319159423 [3319159429]
9783319159430 [3319159437]
類似資料:
Springer International Publishing : Imprint: Springer |
Springer International Publishing : Imprint: Springer |
Springer International Publishing : Imprint: Springer |
Springer International Publishing : Imprint: Springer |
Springer International Publishing : Imprint: Springer |
Springer International Publishing : Imprint: Springer |
Springer International Publishing : Imprint: Springer |
Springer Berlin Heidelberg : Imprint: Springer |
Springer International Publishing : Imprint: Springer |
Springer Berlin Heidelberg : Imprint: Springer |
Springer International Publishing : Imprint: Springer |
Springer Berlin Heidelberg : Imprint: Springer |