Information Security and Cryptology - ICISC 2010

13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers

Editors:

ISBN: 978-3-642-24208-3 (Print) 978-3-642-24209-0 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptanalysis

    1. No Access

      Book Chapter

      Pages 1-15

      Analysis of Nonparametric Estimation Methods for Mutual Information Analysis

    2. No Access

      Book Chapter

      Pages 16-28

      Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher

    3. No Access

      Book Chapter

      Pages 29-48

      Known and Chosen Key Differential Distinguishers for Block Ciphers

    4. No Access

      Book Chapter

      Pages 49-67

      Related-Key Attack on the Full HIGHT

    5. No Access

      Book Chapter

      Pages 68-91

      Preimage Attacks against PKC98-Hash and HAS-V

    6. No Access

      Book Chapter

      Pages 92-103

      Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems

    7. No Access

      Book Chapter

      Pages 104-112

      Cryptanalysis of RSA with Small Prime Combination

  3. Cryptographic Algorithms

    1. No Access

      Book Chapter

      Pages 113-132

      The Twin Bilinear Diffie-Hellman Inversion Problem and Applications

    2. No Access

      Book Chapter

      Pages 133-150

      Group Signatures are Suitable for Constrained Devices

    3. No Access

      Book Chapter

      Pages 151-168

      A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW

  4. Implementation

    1. No Access

      Book Chapter

      Pages 169-176

      Efficient Pairing Computation on Elliptic Curves in Hessian Form

    2. No Access

      Book Chapter

      Pages 177-188

      FPGA Implementation of an Improved Attack against the DECT Standard Cipher

    3. No Access

      Book Chapter

      Pages 189-206

      Chameleon: A Versatile Emulator for Contactless Smartcards

  5. Network and Mobile Security

    1. No Access

      Book Chapter

      Pages 207-221

      Revisiting Address Space Randomization

    2. No Access

      Book Chapter

      Pages 222-232

      Evaluation of a Spyware Detection System Using Thin Client Computing

    3. No Access

      Book Chapter

      Pages 233-251

      A Comparative Usability Evaluation of Traditional Password Managers

    4. No Access

      Book Chapter

      Pages 252-265

      An Adversarial Evaluation of Network Signaling and Control Mechanisms

    5. No Access

      Book Chapter

      Pages 266-277

      Secure Personalized Recommendation System for Mobile User

  6. Symmetric Key Cryptography

    1. No Access

      Book Chapter

      Pages 278-291

      Protecting White-Box AES with Dual Ciphers

    2. No Access

      Book Chapter

      Pages 292-310

      $\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels

previous Page of 2