Information Security and Cryptology

8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers

Editors:

ISBN: 978-3-642-38518-6 (Print) 978-3-642-38519-3 (Online)

Table of contents (23 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-9

    On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown

  3. No Access

    Book Chapter

    Pages 10-28

    Differential Fault Analysis of Twofish

  4. No Access

    Book Chapter

    Pages 29-45

    Improved Differential Cache Attacks on SMS4

  5. No Access

    Book Chapter

    Pages 46-59

    An Extension of Fault Sensitivity Analysis Based on Clockwise Collision

  6. No Access

    Book Chapter

    Pages 60-68

    A Robust Fuzzy Extractor without ECCs

  7. No Access

    Book Chapter

    Pages 69-89

    An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels

  8. No Access

    Book Chapter

    Pages 90-101

    Visual Cryptography for Natural Images and Visual Voting

  9. No Access

    Book Chapter

    Pages 102-121

    RCCA Security for KEM+DEM Style Hybrid Encryptions

  10. No Access

    Book Chapter

    Pages 122-136

    Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations

  11. No Access

    Book Chapter

    Pages 137-156

    Verifiable Structured Encryption

  12. No Access

    Book Chapter

    Pages 157-174

    Nested Merkle’s Puzzles against Sampling Attacks

  13. No Access

    Book Chapter

    Pages 175-197

    Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC

  14. No Access

    Book Chapter

    Pages 198-215

    A General Model for MAC Generation Using Direct Injection

  15. No Access

    Book Chapter

    Pages 216-224

    Collision Attacks on Variant of OCB Mode and Its Series

  16. No Access

    Book Chapter

    Pages 225-245

    The Security and Performance of “GCM” when Short Multiplications Are Used Instead

  17. No Access

    Book Chapter

    Pages 246-262

    Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN

  18. No Access

    Book Chapter

    Pages 263-275

    Fast Evaluation of T-Functions via Time-Memory Trade-Offs

  19. No Access

    Book Chapter

    Pages 276-293

    Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks

  20. No Access

    Book Chapter

    Pages 294-310

    An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators

  21. No Access

    Book Chapter

    Pages 311-330

    New Sequences of Period p n and p n  + 1 via Projective Linear Groups

previous Page of 2