Information Security and Cryptology

7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers

Editors:

ISBN: 978-3-642-34703-0 (Print) 978-3-642-34704-7 (Online)

Table of contents (27 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-21

    Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems

  3. No Access

    Book Chapter

    Pages 22-23

    Cryptanalysis vs. Provable Security

  4. No Access

    Book Chapter

    Pages 24-43

    Boosting Scalability in Anomaly-Based Packed Executable Filtering

  5. No Access

    Book Chapter

    Pages 44-56

    Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs

  6. No Access

    Book Chapter

    Pages 57-76

    Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming

  7. No Access

    Book Chapter

    Pages 77-85

    Adleman-Manders-Miller Root Extraction Method Revisited

  8. No Access

    Book Chapter

    Pages 86-92

    Multi-pixel Encryption Visual Cryptography

  9. No Access

    Book Chapter

    Pages 93-101

    An Improved Electronic Voting Scheme without a Trusted Random Number Generator

  10. No Access

    Book Chapter

    Pages 102-112

    Fault Attacks against the Miller Algorithm in Hessian Coordinates

  11. No Access

    Book Chapter

    Pages 113-130

    Benchmarking for Steganography by Kernel Fisher Discriminant Criterion

  12. No Access

    Book Chapter

    Pages 131-141

    Improved Tradeoff between Encapsulation and Decapsulation of HK09

  13. No Access

    Book Chapter

    Pages 142-159

    Non-interactive Deniable Authentication Protocols

  14. No Access

    Book Chapter

    Pages 160-178

    On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3

  15. No Access

    Book Chapter

    Pages 179-194

    Efficient Self-certified Signatures with Batch Verification

  16. No Access

    Book Chapter

    Pages 195-209

    A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening

  17. No Access

    Book Chapter

    Pages 210-226

    Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves

  18. No Access

    Book Chapter

    Pages 227-236

    Weak-Key Class of MISTY1 for Related-Key Differential Attack

  19. No Access

    Book Chapter

    Pages 237-250

    Cryptanalysis of Reduced-Round KLEIN Block Cipher

  20. No Access

    Book Chapter

    Pages 251-268

    An Efficient RSA Implementation without Precomputation

  21. No Access

    Book Chapter

    Pages 269-288

    The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures

previous Page of 2