×

zbMATH — the first resource for mathematics

Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. (English) Zbl 1239.68010
Lecture Notes in Computer Science 7232. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). xiii, 406 p. (2012).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1213.68026].
Indexed articles:
Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay, A pre-computable signature scheme with efficient verification for RFID, 1-16 [Zbl 1292.68052]
Samelin, Kai; Pöhls, Henrich C.; Bilzhause, Arne; Posegga, Joachim; de Meer, Hermann, Redactable signatures for independent removal of structure and content, 17-33 [Zbl 1294.68077]
Lu, Xianhui; Li, Bao; Mei, Qixiang; Liu, Yamin, Improved efficiency of chosen ciphertext secure encryption from factoring, 34-45 [Zbl 1291.94121]
Gao, Chongzhi; Xie, Dongqing; Wei, Baodian, Deniable encryptions secure against adaptive chosen ciphertext attack, 46-62 [Zbl 1291.94087]
Comon-Lundh, Hubert; Hagiya, Masami; Kawamoto, Yusuke; Sakurada, Hideki, Computational soundness of indistinguishability properties without computable parsing, 63-79 [Zbl 1292.94048]
Bai, Dongxia; Li, Leibo, New impossible differential attacks on Camellia, 80-96 [Zbl 1291.94054]
Liu, Ya; Gu, Dawu; Liu, Zhiqiang; Li, Wei, Impossible differential attacks on reduced-round LBlock, 97-108 [Zbl 1291.94119]
Koyama, Takuma; Wang, Lei; Sasaki, Yu; Sakiyama, Kazuo; Ohta, Kazuo, New truncated differential cryptanalysis on 3D block cipher, 109-125 [Zbl 1291.94114]
Corniaux, Christian L. F.; Ghodosi, Hossein, \(T\)-out-of-\(n\) distributed oblivious transfer protocols in non-adaptive and adaptive settings, 126-143 [Zbl 1292.68048]
Preetha Mathew, K.; Vasant, Sachin; Venkatesan, Sridhar; Pandu Rangan, C., A code-based 1-out-of-\(N\) oblivious transfer based on McEliece assumptions, 144-157 [Zbl 1291.94143]
Wang, Lei; Xiang, Ji; Jing, Jiwu; Zhang, Lingchen, Towards fine-grained access control on browser extensions, 158-169 [Zbl 1292.68060]
Chow, Yang-Wai; Susilo, Willy, Enhanced STE3D-CAP: a novel 3D CAPTCHA family, 170-181 [Zbl 1292.68047]
Filardo, Nathaniel Wesley; Ateniese, Giuseppe, High-entropy visual identification for touch screen devices, 182-198 [Zbl 1292.68050]
Wen, Chuah Chai; Dawson, Edward; González Nieto, Juan Manuel; Simpson, Leonie, A framework for security analysis of key derivation functions, 199-216 [Zbl 1291.94166]
Guo, Teng; Liu, Feng; Wu, ChuanKun, On the equivalence of two definitions of visual cryptography scheme, 217-227 [Zbl 1291.94093]
Shinohara, Naoyuki; Shimoyama, Takeshi; Hayashi, Takuya; Takagi, Tsuyoshi, Key length estimation of pairing-based cryptosystems using \(\eta_T\) pairing, 228-244 [Zbl 1291.94156]
Izawa, Kazuya; Miyaji, Atsuko; Omote, Kazumasa, Lightweight integrity for XOR network coding in wireless sensor networks, 245-258 [Zbl 1294.68075]
Braun, Johannes; Horsch, Moritz; Wiesmaier, Alexander, iPIN and mTAN for secure eID applications, 259-276 [Zbl 1292.68046]
Liedel, Manuel, Secure distributed computation of the square root and applications, 277-288 [Zbl 1292.68053]
Shuo, Tian; Yeping, He; Baozeng, Ding, Prevent kernel return-oriented programming attacks using hardware virtualization, 289-300 [Zbl 1292.68058]
Michéle, Benjamin; Krämer, Juliane; Seifert, Jean-Pierre, Structure-based RSA fault attacks, 301-318 [Zbl 1291.94131]
Abdul-Latip, Shekh Faisal; Reyhanitabar, Mohammad Reza; Susilo, Willy; Seberry, Jennifer, Fault analysis of the KATAN family of block ciphers, 319-336 [Zbl 1291.94038]
Wang, Yanfeng; Wu, Wenling; Yu, Xiaoli, Biclique cryptanalysis of reduced-round Piccolo block cipher, 337-352 [Zbl 1292.94150]
Zhang, Zhenfei; Plantard, Thomas; Susilo, Willy, On the CCA-1 security of somewhat homomorphic encryption over the integers, 353-368 [Zbl 1291.94176]
Joye, Marc; Lepoint, Tancrède, Partial key exposure on RSA with private exponents larger than \(N\), 369-380 [Zbl 1291.94108]
Sun, Yue; Wang, Meiqin, Linear cryptanalysis of reduced-round ICEBERG, 381-392 [Zbl 1291.94160]
Wang, An; Chen, Man; Wang, Zongyue; Ding, Yaoling, Overcoming significant noise: correlation-template-induction attack, 393-404 [Zbl 1291.94163]

MSC:
68-06 Proceedings, conferences, collections, etc. pertaining to computer science
68P25 Data encryption (aspects in computer science)
94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
00B25 Proceedings of conferences of miscellaneous specific interest
Software:
ICEBERG
PDF BibTeX XML Cite
Full Text: DOI