Sultan Al-Hinai, Lynn Batten, Bernard Colbert, Kenneth Wong (auth.), Lynn Margaret Batten, Reihaneh Safavi-Naini (eds.)3540354581, 9783540354581
Table of contents :
Front Matter….Pages –
Algebraic Attacks on Clock-Controlled Stream Ciphers….Pages 1-16
Cache Based Power Analysis Attacks on AES….Pages 17-28
Distinguishing Attack on SOBER-128 with Linear Masking….Pages 29-39
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks….Pages 40-51
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond….Pages 52-63
Improved Cryptanalysis of MAG….Pages 64-75
On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions….Pages 76-86
Augmented Certificate Revocation Lists….Pages 87-98
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security….Pages 99-110
Towards an Invisible Honeypot Monitoring System….Pages 111-122
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service….Pages 123-135
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages….Pages 136-147
More on Stand-Alone and Setup-Free Verifiably Committed Signatures….Pages 148-158
API Monitoring System for Defeating Worms and Exploits in MS-Windows System….Pages 159-170
Hiding Circuit Topology from Unbounded Reverse Engineers….Pages 171-182
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications….Pages 183-194
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption….Pages 195-206
Efficient Identity-Based Signatures Secure in the Standard Model….Pages 207-222
Event-Oriented k -Times Revocable-iff-Linked Group Signatures….Pages 223-234
Key Replacement Attack Against a Generic Construction of Certificateless Signature….Pages 235-246
A Novel Range Test….Pages 247-258
Efficient Primitives from Exponentiation in ℤ p ….Pages 259-270
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity….Pages 271-282
Statistical Decoding Revisited….Pages 283-294
Towards Provable Security for Ubiquitous Applications….Pages 295-312
Oblivious Scalar-Product Protocols….Pages 313-323
On Optimizing the k -Ward Micro-aggregation Technique for Secure Statistical Databases….Pages 324-335
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles….Pages 336-347
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FO pkc and REACT….Pages 348-359
Tag-KEM from Set Partial Domain One-Way Permutations….Pages 360-370
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys….Pages 371-382
Graphical Representation of Authorization Policies for Weighted Credentials….Pages 383-394
Secure Cross-Realm C2C-PAKE Protocol….Pages 395-406
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction….Pages 407-420
Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant….Pages 421-431
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions….Pages 432-443
Back Matter….Pages –
Reviews
There are no reviews yet.