did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642163418

Information Security and Cryptology : 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers

by ; ; ;
  • ISBN13:

    9783642163418

  • ISBN10:

    3642163416

  • Format: Paperback
  • Copyright: 2010-10-31
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $109.00

Summary

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on cryptanalysis; signature and signcryption; key exchange; private computations; cipher design and analysis; public key cryptography; network and system security; hardware security; and web security.

Table of Contents

Cryptanalysis
Integral Cryptanalysis of ARIAp. 1
Cryptanalysis of the ESSENCE Family of Hash Functionsp. 15
Differential-Multiple Linear Cryptanalysisp. 35
Differential Attack on Five Rounds of the SC2000 Block Cipherp. 50
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibilityp. 60
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairingp. 75
Sanitizable Signatures with Strong Transparency in the Standard Modelp. 93
Breaking and Building of Threshold Signcryption Schemesp. 108
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumptionp. 124
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Networkp. 134
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Frameworkp. 144
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authenticationp. 154
Optionally Identifiable Private Handshakesp. 164
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resiliencep. 179
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Latticep. 198
Proposition of Two Cipher Structuresp. 215
Hardware Framework for the Rabbit Stream Cipherp. 230
Linearity within the SMS4 Block Cipherp. 248
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messagesp. 266
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bitsp. 278
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryptionp. 288
Constructing Better KEMs with Partial Message Recoveryp. 303
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Wormsp. 313
Remodeling Vulnerability Informationp. 324
Using Strategy Objectives for Network Security Analysisp. 337
Hardware Security
A DAA Scheme Requiring Less TPM Resourcesp. 350
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tagsp. 366
Weaknesses in Two Recent Lightweight RFID Authentication Protocolsp. 383
Algebraic Side-Channel Attacksp. 393
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofingp. 411
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agentsp. 426
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraintsp. 443
Author Indexp. 459
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program