did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540354581

Information Security and Privacy : 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 Proceedings

by ;
  • ISBN13:

    9783540354581

  • ISBN10:

    3540354581

  • Format: Paperback
  • Copyright: 2006-07-30
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $129.00 Save up to $110.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia in July 2006. The 35 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applications, provable security, protocols, as well as hashing and message authentication.

Table of Contents

Stream Ciphers
Algebraic Attacks on Clock-Controlled Stream Ciphers
Sultan Al-Hinai, Lynn Batten, Bernard Colbert, Kenneth Wong
1(16)
Cache Based Power Analysis Attacks on AES
Jacques Fournier, Michael Tunstall
17(12)
Distinguishing Attack on SOBER-128 with Linear Masking
Joo Yeon Cho, Josef Pieprzyk
29(11)
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks
An Bracken, Joseph Lano, Bart Preneel
40(12)
Symmetric Key Ciphers
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
Matt Henricksen, Ed Dawson
52(12)
Improved Cryptanalysis of MAG
Leonie Simpson, Matt Henricksen
64(12)
On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions
Nicolas T. Courtois, Blandine Debraize, Eric Garrido
76(11)
Network Security
Augmented Certificate Revocation Lists
A. Lakshminarayanan, T.L. Lim
87(12)
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Shidi Xu, Yi Mu, Willy Susilo
99(12)
Towards an Invisible Honeypot Monitoring System
Nguyen Anh Quynh, Yoshiyasu Takefuji
111(12)
Cryptographic Applications
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service
Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai
123(13)
Fingercasting Joint Fingerprinting and Decryption of Broadcast Messages
André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
136(12)
More on Stand-Alone and Setup-Free Verifiably Committed Signatures
Huafei Zhu, Feng Bao
148(11)
Secure Implementation
API Monitoring System for Defeating Worms and Exploits in MS-Windows System
Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu
159(12)
Hiding Circuit Topology from Unbounded Reverse Engineers
Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
171(12)
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications
John W. Holford, William J. Caelli
183(12)
Signatures
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
Shanshan Duan, Zhenfu Cao
195(12)
Efficient Identity-Based Signatures Secure in the Standard Model
Kenneth G. Paterson, Jacob C.N. Schuldt
207(16)
Event-Oriented k-Times Revocable-if-Linked Group Signatures
Man Ho Au, Willy Susilo, Siu-Ming Yin
223(12)
Key Replacement Attack Against a Generic Construction of Certificateless Signature
Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng
235(12)
Theory
A Novel Range Test
Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto
247(12)
Efficient Primitives from Exponentiation in Zp
Shaoquan Jiang
259(12)
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
Ryotaro Hayashi, Keisuke Tanaka
271(12)
Statistical Decoding Revisited
R. Overbeck
283(12)
Invited Talk
Towards Provable Security for Ubiquitous Applications
Mike Burmester, Tri Van Le, Breno de Medeiros
295(18)
Security Applications
Oblivious Scalar-Product Protocols
Huafei Zhu, Feng Bao
313(11)
On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases
Ebaa Fayyoumi, B. John Oommen
324(12)
Provable Security
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
Eike Kiltz, David Galindo
336(12)
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOPxc and REACT
Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai
348(12)
Tag-KEM from Set Partial Domain One-Way Permutations
Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa
360(11)
Protocols
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
371(12)
Graphical Representation of Authorization Policies for Weighted Credentials
Isaac Agudo, Javier Lopez, Jose A. Montenegro
383(12)
Secure Cross-Realm C2C-PAKE Protocol
Yin Yin, Li Bao
395(12)
Hashing and Message Authentication
Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction
Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
407(14)
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant
Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee
421(11)
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions
Katsuyuki Okeya
432(13)
Author Index 445

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program