Willi Geiselmann, Rainer Steinwandt (auth.), Kil-Hyun Nam, Gwangsoo Rhee (eds.)3540767878, 9783540767879
The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.
Table of contents :
Front Matter….Pages –
Cryptanalysis of a Hash Function Proposed at ICISC 2006….Pages 1-10
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006….Pages 11-26
A Cryptanalysis of the Double-Round Quadratic Cryptosystem….Pages 27-36
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment….Pages 37-48
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments….Pages 49-63
Handling Dynamic Information Release….Pages 64-76
Improving the Time Complexity of Matsui’s Linear Cryptanalysis….Pages 77-88
On Large Distributions for Linear Cryptanalysis….Pages 89-101
Passive Attacks on a Class of Authentication Protocols for RFID….Pages 102-115
Side Channel Attacks on Irregularly Decimated Generators….Pages 116-130
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module….Pages 131-143
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences….Pages 144-155
A Secure Virtual Execution Environment for Untrusted Code….Pages 156-167
Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum….Pages 168-179
Improving Upon the TET Mode of Operation….Pages 180-192
New Local Collisions for the SHA-2 Hash Family….Pages 193-205
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL….Pages 206-226
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4….Pages 227-238
New Results on Impossible Differential Cryptanalysis of Reduced AES….Pages 239-250
A Note About the Traceability Properties of Linear Codes….Pages 251-258
Power Analysis Attacks on MDPL and DRSL Implementations….Pages 259-272
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier….Pages 273-281
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA….Pages 282-296
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon’s Algorithm….Pages 297-308
Analysis of Multivariate Hash Functions….Pages 309-323
Colliding Message Pair for 53-Step HAS-160….Pages 324-334
Weaknesses in the HAS-V Compression Function….Pages 335-345
Security-Preserving Asymmetric Protocol Encapsulation….Pages 346-366
Back Matter….Pages –
Reviews
There are no reviews yet.