Security Engineering and Intelligence Informatics

CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings

ISBN: 978-3-642-40587-7 (Print) 978-3-642-40588-4 (Online)

Table of contents (32 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Modern Cryptography

    1. Symmetric-Key Cryptography

      1. No Access

        Book Chapter

        Pages 1-15

        Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock

      2. No Access

        Book Chapter

        Pages 16-28

        Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions

      3. No Access

        Book Chapter

        Pages 29-43

        On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography

      Public-Key Cryptography

      1. No Access

        Book Chapter

        Pages 44-54

        Code-Based Public-Key Encryption Resistant to Key Leakage

      2. No Access

        Book Chapter

        Pages 55-74

        Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics

      Algorithmic Cryptanalysis

      1. No Access

        Book Chapter

        Pages 75-90

        A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images

      2. No Access

        Book Chapter

        Pages 91-104

        Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method

      3. No Access

        Book Chapter

        Pages 105-121

        On the Security of LBlock against the Cube Attack and Side Channel Cube Attack

  3. Security Engineering

    1. Software and Hardware Implementation of Cryptographic Algorithms

      1. No Access

        Book Chapter

        Pages 122-136

        Code-Based Identification and Signature Schemes in Software

      2. No Access

        Book Chapter

        Pages 137-154

        Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine

      3. No Access

        Book Chapter

        Pages 155-167

        Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves

      4. No Access

        Book Chapter

        Pages 168-179

        Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves

      Database Encryption

      1. No Access

        Book Chapter

        Pages 180-193

        Cumulus4j: A Provably Secure Database Abstraction Layer

      Interaction between Cryptographic Theory and Implementation Issues

      1. No Access

        Book Chapter

        Pages 194-208

        Optimal Parameters for XMSS MT

      2. No Access

        Book Chapter

        Pages 209-221

        Solving the Discrete Logarithm Problem for Packing Candidate Preferences

      3. No Access

        Book Chapter

        Pages 222-235

        SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences

      Cyber Security and Dependability

      1. No Access

        Book Chapter

        Pages 236-252

        Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace

      2. No Access

        Book Chapter

        Pages 253-268

        Analyzing the Internet Stability in Presence of Disasters

      3. No Access

        Book Chapter

        Pages 269-287

        Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project

      4. No Access

        Book Chapter

        Pages 288-304

        How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function

previous Page of 2