000 04203nam a22005775i 4500
001 978-3-642-14423-3
003 DE-He213
005 20140220084542.0
007 cr nn 008mamaa
008 100618s2010 gw | s |||| 0|eng d
020 _a9783642144233
_9978-3-642-14423-3
024 7 _a10.1007/978-3-642-14423-3
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aLee, Donghoon.
_eeditor.
245 1 0 _aInformation, Security and Cryptology – ICISC 2009
_h[electronic resource] :
_b12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers /
_cedited by Donghoon Lee, Seokhie Hong.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXIII, 387p. 70 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v5984
505 0 _aKey Management and Key Exchange -- Generic One Round Group Key Exchange in the Standard Model -- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange -- Efficient Certificateless KEM in the Standard Model -- Public Key Cryptography -- Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing -- Factoring Unbalanced Moduli with Known Bits -- Algebraic Cryptanalysis and Stream Cipher -- Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared -- MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals -- Improved Linear Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree Computations -- Lightweight Cryptography and RFID: Tackling the Hidden Overheads -- Side Channel Attack -- Power Analysis of Single-Rail Storage Elements as Used in MDPL -- A Timing Attack against Patterson Algorithm in the McEliece PKC -- Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications -- Privacy Enhanced Technology -- First CPIR Protocol with Data-Dependent Computation -- Efficient Fuzzy Matching and Intersection on Private Datasets -- Efficient Privacy-Preserving Face Recognition -- Cryptographic Protocol -- Linear, Constant-Rounds Bit-Decomposition -- Attacking and Repairing the Improved ModOnions Protocol -- Secret Handshakes with Revocation Support -- Cryptanalysis of Hash Function -- Practical Rebound Attack on 12-Round Cheetah-256 -- Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash -- Improved Preimage Attack for 68-Step HAS-160 -- Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1 -- Network Security -- Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson -- Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth.
520 _aThis book constitutes the proceedings of the 12th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2009.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aComputational complexity.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData Encryption.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aSystems and Data Security.
650 2 4 _aDiscrete Mathematics in Computer Science.
700 1 _aHong, Seokhie.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642144226
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v5984
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-14423-3
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c112471
_d112471