close
1.

電子ブック

EB
Moti Yung, Yevgeniy Dodis, Takeo Kanade, Aggelos Kiayias, Tal Malkin
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
2.

電子ブック

EB
Radu Sion, Reza Curtmola, Sven Dietrich, Takeo Kanade, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Seb?
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
WLC Preface / Josep M. Miret ; Francesc Sebé
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices / Daniel Engels ; Xinxin Fan ; Guang Gong ; Honggang Hu ; Eric M. Smith
Lighten Encryption Schemes for Secure and Private RFID Systems / Sébastien Canard ; Iwen Coisel ; Jonathan Etrog
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags / J. Melia-Segui ; J. Garcia-Alfaro ; J. Herrera-Joancomarti
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results / Jin Tamura ; Kazukuni Kobara ; Hanane Fathi ; Hideki Imai
Reliable Food Traceability Using RFID Tagging / Guillermo Azuara ; José L. Salazar ; José L. Tornos ; Joan J. Piles
Lightweight Cryptography and DPA Countermeasures: A Survey / Amir Moradi ; Axel Poschmann
Securing the Use of RFID-Enabled Banknotes / Santi Martínez ; Concepció Roig ; Magda Valls
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports / Vincenzo Auletta ; Carlo Blundo ; Angelo De Caro ; Emiliano De Cristofaro ; Giuseppe Persiano ; Ivan Visconti
RLCPS Preface / Aggelos Kiayias ; Kazue Sako
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications / Jean-Sébastien Coron ; Aline Gouget ; Pascal Paillier ; Karine Villegas
A Secure and Privacy-Preserving Targeted Ad-System / Elli Androulaki ; Steven M. Bellovin
Cryptographic Cloud Storage / Seny Kamara ; Kristin Lauter
Extending IPsec for Efficient Remote Attestation / Ahmad-Reza Sadeghi ; Steffen Schulz
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions / David William Kravitz
How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTREC / Shin'ichiro Matsuo ; Kunihiko Miyazaki ; Akira Otsuka ; David Basin
WECSR Preface / Sven Dietrich
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk) / Kenneth R. Fleischmann
A Case Study on Measuring Statistical Data in the Tor Anonymity Network / Karsten Loesing ; Steven J. Murdoch ; Roger Dingledine
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets / David Dittrich ; Felix Leder ; Tillmann Werner
Ethical Proactive Threat Research (Position Paper) / John Aycock ; John Sullins
A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper) / Erin Kenneally ; Michael Bailey ; Douglas Maughan
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel) / Lorrie Faith Cranor
Ethical Guidelines for Computer Security Researchers: "Be Reasonable" (Panel) / Len Sassaman
Author Index
WLC Preface / Josep M. Miret ; Francesc Sebé
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices / Daniel Engels ; Xinxin Fan ; Guang Gong ; Honggang Hu ; Eric M. Smith
Lighten Encryption Schemes for Secure and Private RFID Systems / Sébastien Canard ; Iwen Coisel ; Jonathan Etrog
3.

電子ブック

EB
Aggelos Kiayias, Takeo Kanade
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Secure Two-Party Computation
Secure Set Intersection with Untrusted Hardware Tokens / Marc Fischlin ; Benny Pinkas ; Ahmad-Reza Sadeghi ; Thomas Schneider ; Ivan Visconti
Efficient Secure Two-Party Exponentiation / Ching-Hua Yu ; Sherman S.M. Chow ; Kai-Min Chung ; Feng-Hao Liu
Cryptographic Primitives
A General, Flexible and Efficient Proof of Inclusion and Exclusion / Kun Peng
Non-interactive Confirmer Signatures / Kristiyan Haralambiev
Communication-Efficient 2-Round Group Key Establishment from Pairings / Kashi Neupane ; Rainer Steinwandt
Side Channel Attacks
Defeating RSA Multiply-Always and Message Blinding Countermeasures / Marc F. Witteman ; Jasper G.J. van Woudenberg ; Federico Menarini
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns / Chester Rebeiro ; Debdeep Mukhopadhyay
Improving Differential Power Analysis by Elastic Alignment / Bram Bakker
Invited Talk
NSA's Role in the Development of DES / Richard M. George
Authenticated Key Agreement
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys / Atsushi Fujioka ; Koutarou Suzuki
Contributory Password-Authenticated Group Key Exchange with Join Capability / Michel Abdalla ; Céline Chevalier ; Louis Granboulan ; David Pointcheval
Proofs of Security
Ideal Key Derivation and Encryption in Simulation-Based Security / Ralf Küsters ; Max Tuengerthal
Beyond Provable Security Verifiable IND-CCA Security of OAEP / Gilles Barthe ; Benjamin Grégoire ; Yassine Lakhnech ; Santiago Zanella Béguelin
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach / Lei Wang ; Yu Sasaki ; Wataru Komatsubara ; Kazuo Ohta ; Kazuo Sakiyama
MJH: A Faster Alternative to MDC-2 / Jooyung Lee ; Martijn Stam
Block Ciphers
Online Ciphers from Tweakable Blockciphers / Phillip Rogaway ; Haibin Zhang
Meet-in-the-Middle Attacks on Reduced-Round XTEA / Gautham Sekar ; Nicky Mouha ; Vesselin Velichkov ; Bart Preneel
Security Notions
Expedient Non- malleability Notions for Hash Functions / Paul Baecher ; Dominique Schröder
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols / Douglas Stebila ; Lakshmi Kuppusamy ; Jothi Rangasamy ; Colin Boyd ; Juan Gonzalez Nieto
Public-Key Encryption
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes / Joonsang Baek ; Cheng-Kang Chu ; Jianying Zhou
Better Key Sizes (and Attacks) for LWE-Based Encryption / Richard Lindner ; Chris Peikert
Crypto Tools and Parameters
Binary Huff Curves / Julien Devigne ; Marc Joye
A Variant of the F4 Algorithm / Antoine Joux ; Vanessa Vitse
Attribute-Based Signatures / Hemanta K. Maji ; Manoj Prabhakaran ; Mike Rosulek
Digital Signatures
Sub-linear Size Traceable Ring Signatures without Random Oracles / Eiichiro Fujisaki
Author Index
Secure Two-Party Computation
Secure Set Intersection with Untrusted Hardware Tokens / Marc Fischlin ; Benny Pinkas ; Ahmad-Reza Sadeghi ; Thomas Schneider ; Ivan Visconti
Efficient Secure Two-Party Exponentiation / Ching-Hua Yu ; Sherman S.M. Chow ; Kai-Min Chung ; Feng-Hao Liu
4.

電子ブック

EB
Radu Sion, Reza Curtmola, Sven Dietrich, Takeo Kanade, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
WLC Preface / Josep M. Miret ; Francesc Sebé
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices / Daniel Engels ; Xinxin Fan ; Guang Gong ; Honggang Hu ; Eric M. Smith
Lighten Encryption Schemes for Secure and Private RFID Systems / Sébastien Canard ; Iwen Coisel ; Jonathan Etrog
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags / J. Melia-Segui ; J. Garcia-Alfaro ; J. Herrera-Joancomarti
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results / Jin Tamura ; Kazukuni Kobara ; Hanane Fathi ; Hideki Imai
Reliable Food Traceability Using RFID Tagging / Guillermo Azuara ; José L. Salazar ; José L. Tornos ; Joan J. Piles
Lightweight Cryptography and DPA Countermeasures: A Survey / Amir Moradi ; Axel Poschmann
Securing the Use of RFID-Enabled Banknotes / Santi Martínez ; Concepció Roig ; Magda Valls
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports / Vincenzo Auletta ; Carlo Blundo ; Angelo De Caro ; Emiliano De Cristofaro ; Giuseppe Persiano ; Ivan Visconti
RLCPS Preface / Aggelos Kiayias ; Kazue Sako
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications / Jean-Sébastien Coron ; Aline Gouget ; Pascal Paillier ; Karine Villegas
A Secure and Privacy-Preserving Targeted Ad-System / Elli Androulaki ; Steven M. Bellovin
Cryptographic Cloud Storage / Seny Kamara ; Kristin Lauter
Extending IPsec for Efficient Remote Attestation / Ahmad-Reza Sadeghi ; Steffen Schulz
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions / David William Kravitz
How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTREC / Shin'ichiro Matsuo ; Kunihiko Miyazaki ; Akira Otsuka ; David Basin
WECSR Preface / Sven Dietrich
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk) / Kenneth R. Fleischmann
A Case Study on Measuring Statistical Data in the Tor Anonymity Network / Karsten Loesing ; Steven J. Murdoch ; Roger Dingledine
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets / David Dittrich ; Felix Leder ; Tillmann Werner
Ethical Proactive Threat Research (Position Paper) / John Aycock ; John Sullins
A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper) / Erin Kenneally ; Michael Bailey ; Douglas Maughan
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel) / Lorrie Faith Cranor
Ethical Guidelines for Computer Security Researchers: "Be Reasonable" (Panel) / Len Sassaman
Author Index
WLC Preface / Josep M. Miret ; Francesc Sebé
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices / Daniel Engels ; Xinxin Fan ; Guang Gong ; Honggang Hu ; Eric M. Smith
Lighten Encryption Schemes for Secure and Private RFID Systems / Sébastien Canard ; Iwen Coisel ; Jonathan Etrog
5.

電子ブック

EB
Aggelos Kiayias, Takeo Kanade, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Secure Two-Party Computation
Secure Set Intersection with Untrusted Hardware Tokens / Marc Fischlin ; Benny Pinkas ; Ahmad-Reza Sadeghi ; Thomas Schneider ; Ivan Visconti
Efficient Secure Two-Party Exponentiation / Ching-Hua Yu ; Sherman S.M. Chow ; Kai-Min Chung ; Feng-Hao Liu
Cryptographic Primitives
A General, Flexible and Efficient Proof of Inclusion and Exclusion / Kun Peng
Non-interactive Confirmer Signatures / Kristiyan Haralambiev
Communication-Efficient 2-Round Group Key Establishment from Pairings / Kashi Neupane ; Rainer Steinwandt
Side Channel Attacks
Defeating RSA Multiply-Always and Message Blinding Countermeasures / Marc F. Witteman ; Jasper G.J. van Woudenberg ; Federico Menarini
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns / Chester Rebeiro ; Debdeep Mukhopadhyay
Improving Differential Power Analysis by Elastic Alignment / Bram Bakker
Invited Talk
NSA's Role in the Development of DES / Richard M. George
Authenticated Key Agreement
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys / Atsushi Fujioka ; Koutarou Suzuki
Contributory Password-Authenticated Group Key Exchange with Join Capability / Michel Abdalla ; Céline Chevalier ; Louis Granboulan ; David Pointcheval
Proofs of Security
Ideal Key Derivation and Encryption in Simulation-Based Security / Ralf Küsters ; Max Tuengerthal
Beyond Provable Security Verifiable IND-CCA Security of OAEP / Gilles Barthe ; Benjamin Grégoire ; Yassine Lakhnech ; Santiago Zanella Béguelin
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach / Lei Wang ; Yu Sasaki ; Wataru Komatsubara ; Kazuo Ohta ; Kazuo Sakiyama
MJH: A Faster Alternative to MDC-2 / Jooyung Lee ; Martijn Stam
Block Ciphers
Online Ciphers from Tweakable Blockciphers / Phillip Rogaway ; Haibin Zhang
Meet-in-the-Middle Attacks on Reduced-Round XTEA / Gautham Sekar ; Nicky Mouha ; Vesselin Velichkov ; Bart Preneel
Security Notions
Expedient Non- malleability Notions for Hash Functions / Paul Baecher ; Dominique Schröder
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols / Douglas Stebila ; Lakshmi Kuppusamy ; Jothi Rangasamy ; Colin Boyd ; Juan Gonzalez Nieto
Public-Key Encryption
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes / Joonsang Baek ; Cheng-Kang Chu ; Jianying Zhou
Better Key Sizes (and Attacks) for LWE-Based Encryption / Richard Lindner ; Chris Peikert
Crypto Tools and Parameters
Binary Huff Curves / Julien Devigne ; Marc Joye
A Variant of the F4 Algorithm / Antoine Joux ; Vanessa Vitse
Attribute-Based Signatures / Hemanta K. Maji ; Manoj Prabhakaran ; Mike Rosulek
Digital Signatures
Sub-linear Size Traceable Ring Signatures without Random Oracles / Eiichiro Fujisaki
Author Index
Secure Two-Party Computation
Secure Set Intersection with Untrusted Hardware Tokens / Marc Fischlin ; Benny Pinkas ; Ahmad-Reza Sadeghi ; Thomas Schneider ; Ivan Visconti
Efficient Secure Two-Party Exponentiation / Ching-Hua Yu ; Sherman S.M. Chow ; Kai-Min Chung ; Feng-Hao Liu
6.

電子ブック

EB
Moti Yung, Yevgeniy Dodis, Takeo Kanade, Aggelos Kiayias, Tal Malkin
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼