Omschrijving
This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007.
The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization. This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization. Cryptanalysis I
Cryptanalysis of a Hash Function Proposed at ICISC 2006
1
Willi Geiselmann and Rainer Steinwandt
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006
11
Jiqiang Lu
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
27
Antoine Scemama
Access Control
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
37
Jangseong Kim, Zeen Kim, and Kwangjo Kim
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments
49
Jinwei Hu, Ruixuan Li, and Zhengding Lu
Handling Dynamic Information Release
64
Li Jiang, Lingdi Ping, and Xuezeng Pan
Cryptanalysis II
Improving the Time Complexity of Matsui's Linear Cryptanalysis
77
Baudoin Collard, F.-X. Standaert, and Jean-Jacques Quisquater
On Large Distributions for Linear Cryptanalysis
89
Alexander Maximov
Passive Attacks on a Class of Authentication Protocols for RFID
102
Basel Alomair, Loukas Lazos, and Radha Poovendran
Side Channel Attacks on Irregularly Decimated Generators
116
Chuan-Wen Loe and Khoongming Khoo
System Security
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
131
Ruo Ando, Youki Kadobayashi, and Youichi Shinoda
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences
144
Jesus Molina, Xavier Chorin, and Michel Cukier
A Secure Virtual Execution Environment for Untrusted Code
156
Yan Wen and Huaimin Wang
Biometrics
Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum
168
Changlong Jim, Hakil Kim, and Stephen Elliott
Cryptographic Protocols
Improving Upon the TET Mode of Operation
180
Palash Sarkar
Hash Functions I
New Local Collisions for the SHA-2 Hash Family
193
Somitra Kumar Sanadhya and Palash Sarkar
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
206
Hongbo Yu and Xiaoyun Wang
Block and Stream Ciphers
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4
227
Haina Zhang and Xiaoyun Wang
New Results on Impossible Differential Cryptanalysis of Reduced AES
239
Wentao Zhang, Wenling Wu, and Dengguo Feng
Copyright Protection
A Note About the Traceability Properties of Linear Codes
251
Marcel Fernandez, Josep Cotrina, Miguel Soriano, and Nees Domingo
Smart Cards
Power Analysis Attacks on MDPL and DRSL Implementations
259
Amir Moradi, Mahnioud Salmasizadeh, and Mohammad T. Manzuri Shalmani
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier
273
Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, and Pil Joong Lee
Elliptic Curve Cryptosystems
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA
282
Atsuko Miyaji
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm
297
Aya Comuta, Mitsuru Kawazoe, and Tetsuya Takahashi
Hash Functions II
Analysis of Multivariate Hash Functions
309
Jean-Philippe Aumasson and Willi Meier
Colliding Message Pair for 53-Step HAS-160
324
Florian Mendel and Vincent Rijmen
Weaknesses in the HAS-V Compression Function
335
Florian Mendel and Vincent Rijmen
Authentication and Authorization
Security-Preserving Asymmetric Protocol Encapsulation
346
Raphael C.-W. Phan and Serge Vaudenay
Author Index
367