Advances in Information and Computer Security

7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings

  • Goichiro Hanaoka
  • Toshihiro Yamauchi
Conference proceedings IWSEC 2012

DOI: 10.1007/978-3-642-34117-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7631)

Table of contents (16 papers)

  1. Front Matter
  2. Implementation

    1. Model-Based Conformance Testing for Android
      Yiming Jing, Gail-Joon Ahn, Hongxin Hu
      Pages 1-18
    2. Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography
      Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai
      Pages 19-36
    3. Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU
      Chien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling, Axel Poschmann, Sirote Saetang
      Pages 37-50
    4. Very Short Critical Path Implementation of AES with Direct Logic Gates
      Kenta Nekado, Yasuyuki Nogami, Kengo Iokibe
      Pages 51-68
  3. Encryption and Key Exchange

    1. Compact Stateful Encryption Schemes with Ciphertext Verifiability
      S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
      Pages 87-104
    2. Structured Encryption for Conceptual Graphs
      Geong Sen Poh, Moesfa Soeheila Mohamad, Muhammad Reza Z’aba
      Pages 105-122
    3. Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability
      Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka
      Pages 123-137
  4. Cryptanalysis

    1. Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI
      Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii
      Pages 138-155
    2. Boomerang Distinguishers for Full HAS-160 Compression Function
      Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta
      Pages 156-169
    3. Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function
      Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
      Pages 170-181
    4. Annihilators of Fast Discrete Fourier Spectra Attacks
      Jingjing Wang, Kefei Chen, Shixiong Zhu
      Pages 182-196
    5. Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
      Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque
      Pages 197-215
  5. Secure Protocols

    1. Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security
      Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
      Pages 216-232
    2. Efficient Secure Primitive for Privacy Preserving Distributed Computations
      Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang
      Pages 233-243
    3. Generic Construction of GUC Secure Commitment in the KRK Model
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
      Pages 244-260
  6. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols.

Keywords

elliptic curve cryptography hash function privacy preserving random oracle model symmetric-key encryption

Editors and affiliations

  • Goichiro Hanaoka
    • 1
  • Toshihiro Yamauchi
    • 2
  1. 1.Research Institute for Secure Systems (RISEC)National Institute of Advanced Industrial Science and Technology (AIST)TsukubaJapan
  2. 2.Graduate School of Natural Science and TechnologyOkayama UniversityOkayamaJapan

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34116-8
  • Online ISBN 978-3-642-34117-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349