Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 / Gautham Sekar ; Bart Preneel |
Generalized Security Analysis of the Random Key Bits Leakage Attack / Jun Kogure ; Noboru Kunihiro ; Hirosuke Yamamoto |
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher / Yanjun Li ; Wenling Wu ; Lei Zhang |
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward / Chiaki Ohtahara ; Keita Okada ; Yu Sasaki ; Takeshi Shimoyama |
Known-Key Distinguisher on Round-Reduced 3D Block Cipher / Le Dong ; Shuang Wu ; Jian Zou |
Identity-Based Signcryption from Identity-Based Cryptography / Woomyo Lee ; Jae Woo Seo ; Pil Joong Lee |
Order-Preserving Encryption for Non-uniformly Distributed Plaintexts / Dae Hyun Yum ; Duk Soo Kim ; Jin Seok Kim ; Sung Je Hong |
Solving a DLP with Auxiliary Input with the ρ-Algorithm / Yumi Sakemi ; Tetsuya Izu ; Masahiko Takenaka ; Masaya Yasuda |
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems / Yanbin Pan ; Yingpu Deng |
A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage / Tatsuyuki Matsushita ; Shinji Yamanaka ; Fangming Zhao |
Rule Indexing for Efficient Intrusion Detection Systems / Boojoong Kang ; Hye Seon Kim ; Ji Su Yang ; Eul Gyu Im |
Security Data Extraction from LEC 61850 ACSI Models for Network and System Management / Chung-Hyo Kim ; Moon-Seok Choi ; Seong-Ho Ju ; Yong-Hun Lim ; Jong-Mock Baek |
Lightweight Middleware-Based ZigBee Security in Building Energy Management System / Insung Hong ; Jisung Byun ; Sehyun Park |
A Map-Layer-Based Access Control Model / Yingjun Zhang ; Yang Zhang ; Kai Chen |
Application Authentication for Hybrid Services of Broadcasting and Communications Networks / Go Ohtake ; Kazuto Ogawa |
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols / Naoto Kiribuchi ; Ryo Kato ; Takashi Nishide ; Tsukasa Endo ; Hiroshi Yoshiura |
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks / Kwantae Cho ; Dong Hoon Lee |
Mutual Private Set Intersection with Linear Complexity / Myungsun Kim ; Hyung Tae Lee ; Jung Hee Cheon |
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs / Chung Il Sun ; Tae Ho Cho |
Evaluating the Security and Privacy of Near Field Communication - Case: Public Transportation / Jarno Salonen |
Exploiting Routing Tree Construction in CTP / Islam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson |
Author Index |
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 / Gautham Sekar ; Bart Preneel |
Generalized Security Analysis of the Random Key Bits Leakage Attack / Jun Kogure ; Noboru Kunihiro ; Hirosuke Yamamoto |
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher / Yanjun Li ; Wenling Wu ; Lei Zhang |
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward / Chiaki Ohtahara ; Keita Okada ; Yu Sasaki ; Takeshi Shimoyama |
Known-Key Distinguisher on Round-Reduced 3D Block Cipher / Le Dong ; Shuang Wu ; Jian Zou |
Identity-Based Signcryption from Identity-Based Cryptography / Woomyo Lee ; Jae Woo Seo ; Pil Joong Lee |