Information security and cryptology--ICISC 2012 : 15th International Conference, Seoul, Korea, November 28-30, 2012 : revised selected papers /

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 1...

Full description

Saved in:
Bibliographic Details
Corporate Authors: ICISC (Conference) Seoul, Korea); SpringerLink (Online service)
Group Author: Kwon, Taekyoung; Lee, Mun-Kyu; Kwon, Daesung
Published: Springer,
Publisher Address: Berlin ; New York :
Publication Dates: 2013.
Literature type: eBook
Language: English
Series: Lecture notes in computer science, 7839
LNCS sublibrary. SL 4, Security and cryptology
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-37682-5
Summary: This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.
Carrier Form: 1 online resource (xiv, 512 p.) : ill.
Bibliography: Includes bibliographical references and author index.
ISBN: 9783642376825 (electronic bk.)
3642376827 (electronic bk.)
Index Number: QA76
CLC: TP309-532
Contents: Invited Papers.
ML Confidential: Machine Learning on Encrypted Data /
Another Look at Affine-Padding RSA Signatures /
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis /
Attack and Defense.
Balanced Indexing Method for Efficient Intrusion Detection Systems /
Quantitative Questions on Attack-Defense Trees /
DNS Tunneling for Network Penetration /
MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring /
Software and Web Security.
iBinHunt: Binary Hunting with Inter-procedural Control Flow /
Sometimes It's Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys /
Cryptanalysis I.
Improved Impossible Differential Attacks on Large-Block Rijndael /
Cube Cryptanalysis of LBlock with Noisy Leakage /
Comprehensive Study of Integral Analysis on 22-Round LBlock /
New Impossible Differential Attack on SAFER+ and SAFER++ /
Cryptographic Protocol.
An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol /
Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms /
Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol /
Identity-Based Encryption.
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles /
Ciphertext Policy Multi-dimensional Range Encryption /
Efficient Implementation.
Speeding Up Ate Pairing Computation in Affine Coordinates /
An Improved Hardware Implementation of the Grain-128a Stream Cipher /
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers /
Cloud Computing Security.
Trusted Launch of Virtual Machine Instances in Public IaaS Environments /
Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines /
Cryptanalysis II.
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha /
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties /
Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers /
Side Channel Analysis.
Security Evaluation of Cryptographic Modules against Profiling Attacks /
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher /
Digital Signature.
Efficient Group Signatures in the Standard Model /
Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures /
Linear Recurring Sequences for the UOV Key Generation Revisited /
Galindo-Garcia Identity-Based Signature Revisited /
Privacy Enhancement.
Private Over-Threshold Aggregation Protocols /
An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard /
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System /