close
1.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
2.

電子ブック

EB
Joonsang Baek, Feng Bao, Kefei Chen, Takeo Kanade, Xuejia Lai
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
3.

電子ブック

EB
Feng Bao, Takeo Kanade, Hui Li, Guilin Wang
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
4.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
5.

電子ブック

EB
Feng Bao, Takeo Kanade, Jian Weng
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
Public-Key Encryptions Tolerating Adaptive and Composable Adversaries / Huafei Zhu
Encryption Simulatability Reconsidered / Yamin Liu ; Bao Li ; Xianhui Lu ; Xiaoying Jia
Fully Secure Cipertext-Policy Hiding CP-ABE / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes / Yu Chen ; Liqun Chen ; Zhong Chen
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts / Song Luo ; Jianbin Hu
Cloud Security
Toward Trustworthy Clouds' Internet Scale Critical Infrastructure / Imad M. Abbadi
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems / Fangming Zhao ; Takashi Nishide ; Kouichi Sakurai
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and fine-Grained Access Control in Cloud Computing / Jun'e Liu ; Zhiguo Wan ; Ming Gu
Security Applications
Privacy Enhanced Access Control by Means of Policy Blinding / Saeed Sedghi ; Pieter Battel ; Willem Jonker ; Svetla Nikova
Policy- Based Authentication for Mobile Agents / Yikai Wang ; Yi Mu ; Minjie Zhang
Lightweight Delegated Subset Test with Privacy Protection / Xuhua Zhou ; Xuhua Ding ; Kefei Chen
Post-quantum Cryptography and Side-Channel Attack
Improving BDD Cryptosystems in General Lattices / MicHael Rose ; Thomas Plantard ; Willy Susilo
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme / Wei Wei Cao ; Lei Hu ; Jintai Ding ; Zhijun Yin
A Novel Group Signature Scheme Based on MPKC / Guangdong Yang ; Shaohua Tang ; Li Yang
How to Characterize Side-Channel Leakages More Accurately? / Jiye Liu ; Yongbin Zhou ; Yang Han ; Jiantang Li ; Shuguo Yang ; Dengguo Feng
Block Ciphers and MACs
New Impossible Differential and Known-Key Distinguishers for the 3D Cipher / Jorge Nakahara Jr
Meet-in the-Middle Attack on 8 Rounds of the AES Block Cipher Yoni under 192 Key Bit / shuang Wei ; Jiqiang Lu ; Yupu Hu
BCBC: A More Efficient MAC Algorithm / Bo ang ; Wenling Wu ; Liting Zhang
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs / Bozang Liu ; Zheng Gong ; Weidong Qiu ; Dong Zheng
Signature, Secrete Sharing and Traitor Tracing
Short Convertible Undeniable Signature in the Standard Model / Qiong Huang ; Duncan S. Wong
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme / Mahabir Prasad Jhanwar
An Efficient Group-Based Secret Sharing Scheme / Chuni Lv ; Xiaoqi Jia ; Jingqiang Lin ; Jiwu Jing ; Lijun Tian
Traitor Tracing against Public Collaboration / Xingwen Zhao ; Fangguo Zhang
System Security and Network Security
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules / Donghai Tian ; Xi Xiong ; Changzhen Hu ; Peng Liu
Sanitizing Microdata without Leak: Combining Preventive and Curative Actions / Tristan Allard ; Benjamin Nguyen ; Philippe Pucheral
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host / Jonghoon Kwon ; Jehyun Lee ; Heejo Lee
A Model for Constraint and Delegation Management / Quan Pham ; Jason Reid ; Ed Dawson
Security Protocols
Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries
A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols / An Wang ; Zheng Li ; Xianwen Yang ; Yanyan Yu
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware / Ning Ding ; Dawu Gu
Analysis and Improvement of an Authenticated Key Exchange Protocol / Jiaxin Pan ; Libin Wang ; Changshe Ma
Another Elliptic Curve Model for Paster Pairing Computation / Lijun Zhang ; Kunpeng Wang ; Hong Wang ; Dingfeng Ye
Author Index
Public Key Encryption
Public-Key Encryptions Tolerating Adaptive and Composable Adversaries / Huafei Zhu
Encryption Simulatability Reconsidered / Yamin Liu ; Bao Li ; Xianhui Lu ; Xiaoying Jia
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼