Book Volume 6829 2011

Information Security and Cryptology - ICISC 2010

13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers


ISBN: 978-3-642-24208-3 (Print) 978-3-642-24209-0 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptanalysis

    1. Chapter

      Pages 1-15

      Analysis of Nonparametric Estimation Methods for Mutual Information Analysis

    2. Chapter

      Pages 16-28

      Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher

    3. Chapter

      Pages 29-48

      Known and Chosen Key Differential Distinguishers for Block Ciphers

    4. Chapter

      Pages 49-67

      Related-Key Attack on the Full HIGHT

    5. Chapter

      Pages 68-91

      Preimage Attacks against PKC98-Hash and HAS-V

    6. Chapter

      Pages 92-103

      Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems

    7. Chapter

      Pages 104-112

      Cryptanalysis of RSA with Small Prime Combination

  3. Cryptographic Algorithms

    1. Chapter

      Pages 113-132

      The Twin Bilinear Diffie-Hellman Inversion Problem and Applications

    2. Chapter

      Pages 133-150

      Group Signatures are Suitable for Constrained Devices

    3. Chapter

      Pages 151-168

      A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW

  4. Implementation

    1. Chapter

      Pages 169-176

      Efficient Pairing Computation on Elliptic Curves in Hessian Form

    2. Chapter

      Pages 177-188

      FPGA Implementation of an Improved Attack against the DECT Standard Cipher

    3. Chapter

      Pages 189-206

      Chameleon: A Versatile Emulator for Contactless Smartcards

  5. Network and Mobile Security

    1. Chapter

      Pages 207-221

      Revisiting Address Space Randomization

    2. Chapter

      Pages 222-232

      Evaluation of a Spyware Detection System Using Thin Client Computing

    3. Chapter

      Pages 233-251

      A Comparative Usability Evaluation of Traditional Password Managers

    4. Chapter

      Pages 252-265

      An Adversarial Evaluation of Network Signaling and Control Mechanisms

    5. Chapter

      Pages 266-277

      Secure Personalized Recommendation System for Mobile User

  6. Symmetric Key Cryptography

    1. Chapter

      Pages 278-291

      Protecting White-Box AES with Dual Ciphers

    2. Chapter

      Pages 292-310

      \(\mathcal{E}\) -MACs: Towards More Secure and More Efficient Constructions of Secure Channels

previous Page of 2