Book Volume 8128 2013

Security Engineering and Intelligence Informatics

CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings

ISBN: 978-3-642-40587-7 (Print) 978-3-642-40588-4 (Online)

Table of contents (32 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Modern Cryptography

    1. Symmetric-Key Cryptography

      1. Chapter

        Pages 1-15

        Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock

      2. Chapter

        Pages 16-28

        Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions

      3. Chapter

        Pages 29-43

        On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography

      Public-Key Cryptography

      1. Chapter

        Pages 44-54

        Code-Based Public-Key Encryption Resistant to Key Leakage

      2. Chapter

        Pages 55-74

        Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics

      Algorithmic Cryptanalysis

      1. Chapter

        Pages 75-90

        A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images

      2. Chapter

        Pages 91-104

        Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method

      3. Chapter

        Pages 105-121

        On the Security of LBlock against the Cube Attack and Side Channel Cube Attack

  3. Security Engineering

    1. Software and Hardware Implementation of Cryptographic Algorithms

      1. Chapter

        Pages 122-136

        Code-Based Identification and Signature Schemes in Software

      2. Chapter

        Pages 137-154

        Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine

      3. Chapter

        Pages 155-167

        Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves

      4. Chapter

        Pages 168-179

        Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves

      Database Encryption

      1. Chapter

        Pages 180-193

        Cumulus4j: A Provably Secure Database Abstraction Layer

      Interaction between Cryptographic Theory and Implementation Issues

      1. Chapter

        Pages 194-208

        Optimal Parameters for XMSS MT

      2. Chapter

        Pages 209-221

        Solving the Discrete Logarithm Problem for Packing Candidate Preferences

      3. Chapter

        Pages 222-235

        SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences

      Cyber Security and Dependability

      1. Chapter

        Pages 236-252

        Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace

      2. Chapter

        Pages 253-268

        Analyzing the Internet Stability in Presence of Disasters

      3. Chapter

        Pages 269-287

        Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project

      4. Chapter

        Pages 288-304

        How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function

previous Page of 2