Cryptanalysis | |
Integral Cryptanalysis of ARIA | p. 1 |
Cryptanalysis of the ESSENCE Family of Hash Functions | p. 15 |
Differential-Multiple Linear Cryptanalysis | p. 35 |
Differential Attack on Five Rounds of the SC2000 Block Cipher | p. 50 |
Signature and Signcryption | |
Pairing-Based Nominative Signatures with Selective and Universal Convertibility | p. 60 |
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing | p. 75 |
Sanitizable Signatures with Strong Transparency in the Standard Model | p. 93 |
Breaking and Building of Threshold Signcryption Schemes | p. 108 |
Key Exchange | |
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption | p. 124 |
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network | p. 134 |
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework | p. 144 |
Private Computations | |
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication | p. 154 |
Optionally Identifiable Private Handshakes | p. 164 |
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience | p. 179 |
Cipher Design and Analysis | |
Gemstone: A New Stream Cipher Using Coupled Map Lattice | p. 198 |
Proposition of Two Cipher Structures | p. 215 |
Hardware Framework for the Rabbit Stream Cipher | p. 230 |
Linearity within the SMS4 Block Cipher | p. 248 |
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages | p. 266 |
Public Key Cryptography | |
Weak Keys in RSA with Primes Sharing Least Significant Bits | p. 278 |
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption | p. 288 |
Constructing Better KEMs with Partial Message Recovery | p. 303 |
Network and System Security | |
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms | p. 313 |
Remodeling Vulnerability Information | p. 324 |
Using Strategy Objectives for Network Security Analysis | p. 337 |
Hardware Security | |
A DAA Scheme Requiring Less TPM Resources | p. 350 |
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags | p. 366 |
Weaknesses in Two Recent Lightweight RFID Authentication Protocols | p. 383 |
Algebraic Side-Channel Attacks | p. 393 |
Web Security | |
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing | p. 411 |
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents | p. 426 |
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints | p. 443 |
Author Index | p. 459 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.