Table of Contents for: Information security and cryptology : 8t

 Staff view

You must be logged in to Tag Records

Information security and cryptology : 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012 : revised selected papers /

Mirosław Kutyłowski, Moti Yung (eds.).

Book Cover
Names: Kutyłowski, Mirosław. | Yung, Moti.
Published: Berlin ; Springer, ©2013.
Series: Lecture notes in computer science ; 7763.
LNCS sublibrary. SL 4, Security and cryptology.
Topics: Computer security - Congresses. | Data encryption (Computer science) - Congresses. | Computer Security.
Genres: Electronic books. | Congress. | Conference papers and proceedings.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown / Lidong Han, Wei Wei, Mingjie Liu -- Differential Fault Analysis of Twofish / Sk Subidh Ali, Debdeep Mukhopadhyay -- Improved Differential Cache Attacks on SMS4 / Phuong Ha Nguyen, Chester Rebeiro -- An Extension of Fault Sensitivity Analysis Based on Clockwise Collision / Yang Li, Kazuo Ohta, Kazuo Sakiyama -- A Robust Fuzzy Extractor without ECCs / Jintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou -- An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels / Yang Yu, Zhanfei Zhou -- Visual Cryptography for Natural Images and Visual Voting / Teng Guo, Feng Liu, ChuanKun Wu -- RCCA Security for KEM+DEM Style Hybrid Encryptions / Yuan Chen, Qingkuan Dong -- Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations / Jintai Ding, Ai Ren, Chengdong Tao -- Verifiable Structured Encryption / Moesfa Soeheila Mohamad, Geong Sen Poh -- Nested Merkle's Puzzles against Sampling Attacks / Shlomi Dolev, Nova Fandina, Ximing Li -- Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC / Michael Walter, Stanislav Bulygin, Johannes Buchmann -- A General Model for MAC Generation Using Direct Injection / Harry Bartlett, Mufeed AlMashrafi, Leonie Simpson -- Collision Attacks on Variant of OCB Mode and Its Series / Zhelei Sun, Peng Wang, Liting Zhang -- The Security and Performance of "GCM" when Short Multiplications Are Used Instead / Kazumaro Aoki, Kan Yasuda -- Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN / Risto M. Hakala, Atle Kivelä, Kaisa Nyberg -- Fast Evaluation of T-Functions via Time-Memory Trade-Offs / Tao Shi, Vladimir Anashin, Dongdai Lin -- Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks / Tianze Wang, Meicheng Liu, Dongdai Lin -- An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators / Lin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li -- New Sequences of Period p n and p n + 1via Projective Linear Groups / Lin Wang, Zhi Hu -- Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones / Yuxin Meng, Duncan S. Wong, Roman Schlegel -- Secure Product Tracking in Supply Chain / Mehdi Khalfaoui, Refik Molva, Laurent Gomez -- The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks / Aslı Bay, Ioana Boureanu, Aikaterini Mitrokotsa.

Table of Contents for: Information security and cryptology : 8t