Advances in Information and Computer Security

7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings

Editors:

ISBN: 978-3-642-34116-8 (Print) 978-3-642-34117-5 (Online)

Table of contents (16 chapters)

  1. Front Matter

    Pages -

  2. Implementation

    1. No Access

      Book Chapter

      Pages 1-18

      Model-Based Conformance Testing for Android

    2. No Access

      Book Chapter

      Pages 19-36

      Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography

    3. No Access

      Book Chapter

      Pages 37-50

      Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU

    4. No Access

      Book Chapter

      Pages 51-68

      Very Short Critical Path Implementation of AES with Direct Logic Gates

  3. Encryption and Key Exchange

    1. No Access

      Book Chapter

      Pages 69-86

      One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary

    2. No Access

      Book Chapter

      Pages 87-104

      Compact Stateful Encryption Schemes with Ciphertext Verifiability

    3. No Access

      Book Chapter

      Pages 105-122

      Structured Encryption for Conceptual Graphs

    4. No Access

      Book Chapter

      Pages 123-137

      Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability

  4. Cryptanalysis

    1. No Access

      Book Chapter

      Pages 138-155

      Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI

    2. No Access

      Book Chapter

      Pages 156-169

      Boomerang Distinguishers for Full HAS-160 Compression Function

    3. No Access

      Book Chapter

      Pages 170-181

      Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function

    4. No Access

      Book Chapter

      Pages 182-196

      Annihilators of Fast Discrete Fourier Spectra Attacks

    5. No Access

      Book Chapter

      Pages 197-215

      Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher

  5. Secure Protocols

    1. No Access

      Book Chapter

      Pages 216-232

      Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security

    2. No Access

      Book Chapter

      Pages 233-243

      Efficient Secure Primitive for Privacy Preserving Distributed Computations

    3. No Access

      Book Chapter

      Pages 244-260

      Generic Construction of GUC Secure Commitment in the KRK Model

  6. Back Matter

    Pages -