Skip to main content
main-content

Über dieses Buch

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012.

The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.

Inhaltsverzeichnis

Frontmatter

2013 | OriginalPaper | Buchkapitel

On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown

Lidong Han, Wei Wei, Mingjie Liu

2013 | OriginalPaper | Buchkapitel

Differential Fault Analysis of Twofish

Sk Subidh Ali, Debdeep Mukhopadhyay

2013 | OriginalPaper | Buchkapitel

Improved Differential Cache Attacks on SMS4

Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, Huaxiong Wang

2013 | OriginalPaper | Buchkapitel

An Extension of Fault Sensitivity Analysis Based on Clockwise Collision

Yang Li, Kazuo Ohta, Kazuo Sakiyama

2013 | OriginalPaper | Buchkapitel

A Robust Fuzzy Extractor without ECCs

Jintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou

2013 | OriginalPaper | Buchkapitel

An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels

Yang Yu, Zhanfei Zhou

2013 | OriginalPaper | Buchkapitel

Visual Cryptography for Natural Images and Visual Voting

Teng Guo, Feng Liu, ChuanKun Wu

2013 | OriginalPaper | Buchkapitel

RCCA Security for KEM+DEM Style Hybrid Encryptions

Yuan Chen, Qingkuan Dong

2013 | OriginalPaper | Buchkapitel

Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations

Jintai Ding, Ai Ren, Chengdong Tao

2013 | OriginalPaper | Buchkapitel

Verifiable Structured Encryption

Moesfa Soeheila Mohamad, Geong Sen Poh

2013 | OriginalPaper | Buchkapitel

Nested Merkle’s Puzzles against Sampling Attacks

Shlomi Dolev, Nova Fandina, Ximing Li

2013 | OriginalPaper | Buchkapitel

Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC

Michael Walter, Stanislav Bulygin, Johannes Buchmann

2013 | OriginalPaper | Buchkapitel

A General Model for MAC Generation Using Direct Injection

Harry Bartlett, Mufeed AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong

2013 | OriginalPaper | Buchkapitel

Collision Attacks on Variant of OCB Mode and Its Series

Zhelei Sun, Peng Wang, Liting Zhang

2013 | OriginalPaper | Buchkapitel

The Security and Performance of “GCM” when Short Multiplications Are Used Instead

Kazumaro Aoki, Kan Yasuda

2013 | OriginalPaper | Buchkapitel

Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN

Risto M. Hakala, Atle Kivelä, Kaisa Nyberg

2013 | OriginalPaper | Buchkapitel

Fast Evaluation of T-Functions via Time-Memory Trade-Offs

Tao Shi, Vladimir Anashin, Dongdai Lin

2013 | OriginalPaper | Buchkapitel

Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks

Tianze Wang, Meicheng Liu, Dongdai Lin

2013 | OriginalPaper | Buchkapitel

An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators

Lin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li

2013 | OriginalPaper | Buchkapitel

New Sequences of Period p n and p n  + 1 via Projective Linear Groups

Lin Wang, Zhi Hu

2013 | OriginalPaper | Buchkapitel

Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones

Yuxin Meng, Duncan S. Wong, Roman Schlegel, Lam-for Kwok

2013 | OriginalPaper | Buchkapitel

Secure Product Tracking in Supply Chain

Mehdi Khalfaoui, Refik Molva, Laurent Gomez

2013 | OriginalPaper | Buchkapitel

The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks

Aslı Bay, Ioana Boureanu, Aikaterini Mitrokotsa, Iosif Spulber, Serge Vaudenay

Backmatter

Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.

Whitepaper

- ANZEIGE -

Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!

Bildnachweise