Information Security and Cryptology - ICISC 2007

10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings

Omschrijving

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007. The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization. This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization. Cryptanalysis I Cryptanalysis of a Hash Function Proposed at ICISC 2006 1 Willi Geiselmann and Rainer Steinwandt Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 11 Jiqiang Lu A Cryptanalysis of the Double-Round Quadratic Cryptosystem 27 Antoine Scemama Access Control A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment 37 Jangseong Kim, Zeen Kim, and Kwangjo Kim Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments 49 Jinwei Hu, Ruixuan Li, and Zhengding Lu Handling Dynamic Information Release 64 Li Jiang, Lingdi Ping, and Xuezeng Pan Cryptanalysis II Improving the Time Complexity of Matsui's Linear Cryptanalysis 77 Baudoin Collard, F.-X. Standaert, and Jean-Jacques Quisquater On Large Distributions for Linear Cryptanalysis 89 Alexander Maximov Passive Attacks on a Class of Authentication Protocols for RFID 102 Basel Alomair, Loukas Lazos, and Radha Poovendran Side Channel Attacks on Irregularly Decimated Generators 116 Chuan-Wen Loe and Khoongming Khoo System Security Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module 131 Ruo Ando, Youki Kadobayashi, and Youichi Shinoda Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences 144 Jesus Molina, Xavier Chorin, and Michel Cukier A Secure Virtual Execution Environment for Untrusted Code 156 Yan Wen and Huaimin Wang Biometrics Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum 168 Changlong Jim, Hakil Kim, and Stephen Elliott Cryptographic Protocols Improving Upon the TET Mode of Operation 180 Palash Sarkar Hash Functions I New Local Collisions for the SHA-2 Hash Family 193 Somitra Kumar Sanadhya and Palash Sarkar Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL 206 Hongbo Yu and Xiaoyun Wang Block and Stream Ciphers Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4 227 Haina Zhang and Xiaoyun Wang New Results on Impossible Differential Cryptanalysis of Reduced AES 239 Wentao Zhang, Wenling Wu, and Dengguo Feng Copyright Protection A Note About the Traceability Properties of Linear Codes 251 Marcel Fernandez, Josep Cotrina, Miguel Soriano, and Nees Domingo Smart Cards Power Analysis Attacks on MDPL and DRSL Implementations 259 Amir Moradi, Mahnioud Salmasizadeh, and Mohammad T. Manzuri Shalmani Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier 273 Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, and Pil Joong Lee Elliptic Curve Cryptosystems Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA 282 Atsuko Miyaji Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm 297 Aya Comuta, Mitsuru Kawazoe, and Tetsuya Takahashi Hash Functions II Analysis of Multivariate Hash Functions 309 Jean-Philippe Aumasson and Willi Meier Colliding Message Pair for 53-Step HAS-160 324 Florian Mendel and Vincent Rijmen Weaknesses in the HAS-V Compression Function 335 Florian Mendel and Vincent Rijmen Authentication and Authorization Security-Preserving Asymmetric Protocol Encapsulation 346 Raphael C.-W. Phan and Serge Vaudenay Author Index 367
€ 61,20
Paperback
 
Gratis verzending vanaf
€ 19,95 binnen Nederland
Schrijver
Titel
Information Security and Cryptology - ICISC 2007
Uitgever
Springer-Verlag GmbH
Jaar
2007
Taal
Engels
Pagina's
384
Gewicht
567 gr
EAN
9783540767879
Afmetingen
229 x 152 x 19 mm
Bindwijze
Paperback

U ontvangt bij ons altijd de laatste druk!


Rubrieken

Boekstra