close
1.

電子ブック

EB
Joonsang Baek, Feng Bao, Kefei Chen, Takeo Kanade, Xuejia Lai
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
2.

電子ブック

EB
Feng Bao, Takeo Kanade, Hui Li, Guilin Wang
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
3.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
4.

電子ブック

EB
Feng Bao, Takeo Kanade, Jian Weng
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
Public-Key Encryptions Tolerating Adaptive and Composable Adversaries / Huafei Zhu
Encryption Simulatability Reconsidered / Yamin Liu ; Bao Li ; Xianhui Lu ; Xiaoying Jia
Fully Secure Cipertext-Policy Hiding CP-ABE / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes / Yu Chen ; Liqun Chen ; Zhong Chen
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts / Song Luo ; Jianbin Hu
Cloud Security
Toward Trustworthy Clouds' Internet Scale Critical Infrastructure / Imad M. Abbadi
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems / Fangming Zhao ; Takashi Nishide ; Kouichi Sakurai
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and fine-Grained Access Control in Cloud Computing / Jun'e Liu ; Zhiguo Wan ; Ming Gu
Security Applications
Privacy Enhanced Access Control by Means of Policy Blinding / Saeed Sedghi ; Pieter Battel ; Willem Jonker ; Svetla Nikova
Policy- Based Authentication for Mobile Agents / Yikai Wang ; Yi Mu ; Minjie Zhang
Lightweight Delegated Subset Test with Privacy Protection / Xuhua Zhou ; Xuhua Ding ; Kefei Chen
Post-quantum Cryptography and Side-Channel Attack
Improving BDD Cryptosystems in General Lattices / MicHael Rose ; Thomas Plantard ; Willy Susilo
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme / Wei Wei Cao ; Lei Hu ; Jintai Ding ; Zhijun Yin
A Novel Group Signature Scheme Based on MPKC / Guangdong Yang ; Shaohua Tang ; Li Yang
How to Characterize Side-Channel Leakages More Accurately? / Jiye Liu ; Yongbin Zhou ; Yang Han ; Jiantang Li ; Shuguo Yang ; Dengguo Feng
Block Ciphers and MACs
New Impossible Differential and Known-Key Distinguishers for the 3D Cipher / Jorge Nakahara Jr
Meet-in the-Middle Attack on 8 Rounds of the AES Block Cipher Yoni under 192 Key Bit / shuang Wei ; Jiqiang Lu ; Yupu Hu
BCBC: A More Efficient MAC Algorithm / Bo ang ; Wenling Wu ; Liting Zhang
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs / Bozang Liu ; Zheng Gong ; Weidong Qiu ; Dong Zheng
Signature, Secrete Sharing and Traitor Tracing
Short Convertible Undeniable Signature in the Standard Model / Qiong Huang ; Duncan S. Wong
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme / Mahabir Prasad Jhanwar
An Efficient Group-Based Secret Sharing Scheme / Chuni Lv ; Xiaoqi Jia ; Jingqiang Lin ; Jiwu Jing ; Lijun Tian
Traitor Tracing against Public Collaboration / Xingwen Zhao ; Fangguo Zhang
System Security and Network Security
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules / Donghai Tian ; Xi Xiong ; Changzhen Hu ; Peng Liu
Sanitizing Microdata without Leak: Combining Preventive and Curative Actions / Tristan Allard ; Benjamin Nguyen ; Philippe Pucheral
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host / Jonghoon Kwon ; Jehyun Lee ; Heejo Lee
A Model for Constraint and Delegation Management / Quan Pham ; Jason Reid ; Ed Dawson
Security Protocols
Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries
A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols / An Wang ; Zheng Li ; Xianwen Yang ; Yanyan Yu
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware / Ning Ding ; Dawu Gu
Analysis and Improvement of an Authenticated Key Exchange Protocol / Jiaxin Pan ; Libin Wang ; Changshe Ma
Another Elliptic Curve Model for Paster Pairing Computation / Lijun Zhang ; Kunpeng Wang ; Hong Wang ; Dingfeng Ye
Author Index
Public Key Encryption
Public-Key Encryptions Tolerating Adaptive and Composable Adversaries / Huafei Zhu
Encryption Simulatability Reconsidered / Yamin Liu ; Bao Li ; Xianhui Lu ; Xiaoying Jia
5.

電子ブック

EB
Feng Bao, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York NY : ACM, 2015
所蔵情報: loading…
6.

電子ブック

EB
Feng Bao, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York NY : ACM, 2015
所蔵情報: loading…
7.

電子ブック

EB
Feng Bao, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , ACM, 2007
所蔵情報: loading…
8.

電子ブック

EB
Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
9.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
10.

図書

東工大
目次DB

図書
東工大
目次DB
Feng Bao, Robert Deng, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xi, 454 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2947
所蔵情報: loading…
目次情報: 続きを見る
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point Pradeep Kumar Mishra and Palash Sarkar 41
Fast Arithmetic on Jacobians of Picard Curves Stephane Flon and Roger Oyono 55
Undeniable Signatures Based on Characters: How to Sign with One Bit Jean Monnerat and Serge Vaudenay 69
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, and Josef Pieprzyk 86
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model Huafei Zhu 101
Constant Round Authenticated Group Key Agreement via Distributed Computation Emmanuel Bresson and Dario Catalano 115
Efficient ID-based Group Key Agreement with Bilinear Maps Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee 130
New Security Results on Encrypted Key Exchange Emmanuel Bresson, Olivier Chevassut, and David Pointcheval 145
New Results on the Hardness of Diffie-Hellman Bits Maria Isabel Gonzalez Vasco, Mats Naeslung, and Igor E. Shparlinski 159
Short Exponent Diffie-Hellman Problems Takeshi Koshiba and Kaoru Kurosawa 173
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups Benoit Libert and Jean-Jacques Quisquater 187
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 Nicolas T. Courtois 201
Secret Exponent Attacks on RSA-type Schemes with Moduli N=Prq Alexander May 218
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" Reihaneh Safavi-Naini, Luke McAven, and Moti Yung 231
From Digital Signature to ID-based Identification/Signature Kaoru Kurosawa and Swee-Huay Heng 248
Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 262
An Efficient Signature Scheme from Bilinear Pairings and Its Applications Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo 277
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka 291
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation Jintai Ding 305
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability Jun Furukawa 319
A Point Compression Method for Elliptic Curves Defined over GF(2n) Brian King 333
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny Toru Akishita and Tsuyoshi Takagi 346
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, and Hideki Imai 360
QuasiModo: Efficient Certificate Validation and Revocation Farid F. Elwailly, Craig Gentry, and Zulfikar Ramzan 375
A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga and Kouichi Sakurai 389
A First Approach to Provide Anonymity in Attribute Certificates Vicente Benjumea, Javier Lopez, Jose A. Montenegro, and Jose M. Troya 402
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups Igor E. Shparlinski and Arne Winterhof 416
Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, and Helger Lipmaa 425
A Correct, Private, and Efficient Mix Network Kun Peng, Colin Boyd, Ed Dawson, and Kapali Viswanathan 439
Author Index 455
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
11.

図書

図書
Jianying Zhou, Moti Yung, Feng Bao (eds.)
出版情報: Berlin : Springer, c2006  xiv, 488 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3989
所蔵情報: loading…
12.

図書

図書
Jianying Zhou ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xii, 516 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3650
所蔵情報: loading…
13.

図書

図書
Robert H. Deng ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xii, 424 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3439
所蔵情報: loading…
14.

電子ブック

EB
Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing, International Association for Cryptologic Research.
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
15.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
16.

電子ブック

EB
ISC 2005, Takeo Kanade, Jianying Zhou, Robert H. Deng, Javier Lopez, Feng Bao
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
17.

電子ブック

EB
ISPEC 2005, Robert Deng, Takeo Kanade, Robert H. Deng, HweeHwa Pang, Jianying Zhou, Feng Bao
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
18.

電子ブック

EB
Feng Bao, Takeo Kanade, Hui Li, Guilin Wang
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
19.

電子ブック

EB
Feng Bao, Takeo Kanade, Jian Weng, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
Public-Key Encryptions Tolerating Adaptive and Composable Adversaries / Huafei Zhu
Encryption Simulatability Reconsidered / Yamin Liu ; Bao Li ; Xianhui Lu ; Xiaoying Jia
Fully Secure Cipertext-Policy Hiding CP-ABE / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes / Yu Chen ; Liqun Chen ; Zhong Chen
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts / Song Luo ; Jianbin Hu
Cloud Security
Toward Trustworthy Clouds' Internet Scale Critical Infrastructure / Imad M. Abbadi
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems / Fangming Zhao ; Takashi Nishide ; Kouichi Sakurai
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and fine-Grained Access Control in Cloud Computing / Jun'e Liu ; Zhiguo Wan ; Ming Gu
Security Applications
Privacy Enhanced Access Control by Means of Policy Blinding / Saeed Sedghi ; Pieter Battel ; Willem Jonker ; Svetla Nikova
Policy- Based Authentication for Mobile Agents / Yikai Wang ; Yi Mu ; Minjie Zhang
Lightweight Delegated Subset Test with Privacy Protection / Xuhua Zhou ; Xuhua Ding ; Kefei Chen
Post-quantum Cryptography and Side-Channel Attack
Improving BDD Cryptosystems in General Lattices / MicHael Rose ; Thomas Plantard ; Willy Susilo
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme / Wei Wei Cao ; Lei Hu ; Jintai Ding ; Zhijun Yin
A Novel Group Signature Scheme Based on MPKC / Guangdong Yang ; Shaohua Tang ; Li Yang
How to Characterize Side-Channel Leakages More Accurately? / Jiye Liu ; Yongbin Zhou ; Yang Han ; Jiantang Li ; Shuguo Yang ; Dengguo Feng
Block Ciphers and MACs
New Impossible Differential and Known-Key Distinguishers for the 3D Cipher / Jorge Nakahara Jr
Meet-in the-Middle Attack on 8 Rounds of the AES Block Cipher Yoni under 192 Key Bit / shuang Wei ; Jiqiang Lu ; Yupu Hu
BCBC: A More Efficient MAC Algorithm / Bo ang ; Wenling Wu ; Liting Zhang
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs / Bozang Liu ; Zheng Gong ; Weidong Qiu ; Dong Zheng
Signature, Secrete Sharing and Traitor Tracing
Short Convertible Undeniable Signature in the Standard Model / Qiong Huang ; Duncan S. Wong
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme / Mahabir Prasad Jhanwar
An Efficient Group-Based Secret Sharing Scheme / Chuni Lv ; Xiaoqi Jia ; Jingqiang Lin ; Jiwu Jing ; Lijun Tian
Traitor Tracing against Public Collaboration / Xingwen Zhao ; Fangguo Zhang
System Security and Network Security
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules / Donghai Tian ; Xi Xiong ; Changzhen Hu ; Peng Liu
Sanitizing Microdata without Leak: Combining Preventive and Curative Actions / Tristan Allard ; Benjamin Nguyen ; Philippe Pucheral
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host / Jonghoon Kwon ; Jehyun Lee ; Heejo Lee
A Model for Constraint and Delegation Management / Quan Pham ; Jason Reid ; Ed Dawson
Security Protocols
Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries
A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols / An Wang ; Zheng Li ; Xianwen Yang ; Yanyan Yu
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware / Ning Ding ; Dawu Gu
Analysis and Improvement of an Authenticated Key Exchange Protocol / Jiaxin Pan ; Libin Wang ; Changshe Ma
Another Elliptic Curve Model for Paster Pairing Computation / Lijun Zhang ; Kunpeng Wang ; Hong Wang ; Dingfeng Ye
Author Index
Public Key Encryption
Public-Key Encryptions Tolerating Adaptive and Composable Adversaries / Huafei Zhu
Encryption Simulatability Reconsidered / Yamin Liu ; Bao Li ; Xianhui Lu ; Xiaoying Jia
20.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
21.

電子ブック

EB
International Workshop on Practice and Theory in Public Key Cryptography, Feng Bao, Robert Deng, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2004
所蔵情報: loading…
目次情報: 続きを見る
A Generalized Wiener Attack on RSA / Johannes Blömer ; Alexander May
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem / Jean-Sébastien Coron
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism / Roberto Maria Avanzi ; Mathieu Ciet ; Francesco Sica
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point / Pradeep Kumar Mishra ; Palash Sarkar
Fast Arithmetic on Jacobians of Picard Curves / Stéphane Flon ; Roger Oyono
Undeniable Signatures Based on Characters: How to Sign with One Bit / Jean Monnerat ; Serge Vaudenay
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures / Ron Steinfeld ; Huaxiong Wang ; Josef Pieprzyk
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model / Huafei Zhu
Constant Round Authenticated Group Key Agreement via Distributed Computation / Emmanuel Bresson ; Dario Catalano
Efficient ID-based Group Key Agreement with Bilinear Maps / Kyu Young Choi ; Jung Yeon Hwang ; Dong Hoon Lee
New Security Results on Encrypted Key Exchange / Olivier Chevassut ; David Pointcheval
New Results on the Hardness of Diffie-Hellman Bits / María Isabel González Vasco ; Mats Näslund ; Igor E. Shparlinski
Short Exponent Diffie-Hellman Problems / Takeshi Koshiba ; Kaoru Kurosawa
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups / Benoît Libert ; Jean-Jacques Quisquater
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" / Nicolas T. Courtois ; Reihaneh Safavi-Naini ; Luke McAven ; Moti Yung
From Digital Signature to ID-based Identification/Signature / Swee-Huay Heng
Identity-Based Threshold Decryption / Joonsang Baek ; Yuliang Zheng
An Efficient Signature Scheme from Bilinear Pairings and Its Applications / Fangguo Zhang ; Willy Susilo
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications / Ryotaro Hayashi ; Tatsuaki Okamoto ; Keisuke Tanaka
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation / Jintai Ding
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability / Jun Furukawa
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny / Brian King ; Toru Akishita ; Tsuyoshi Takagi
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? / Rui Zhang ; Goichiro Hanaoka ; Junji Shikata ; Hideki Imai
QuasiModo: Efficient Certificate Validation and Revocation / Farid F. Elwailly ; Craig Gentry ; Zulfikar Ramzan
A Distributed Online Certificate Status Protocol with a Single Public Key / Satoshi Koga ; Kouichi Sakurai
A First Approach to Provide Anonymity in Attribute Certificates / Vicente Benjumea ; Javier Lopez ; Jose A. Montenegro ; Jose M. Troya
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups / Arne Winterhof
Cryptographic Randomized Response Techniques / Andris Ambainis ; Markus Jakobsson ; Helger Lipmaa
A Correct, Private, and Efficient Mix Network / Kun Peng ; Colin Boyd ; Ed Dawson ; Kapali Viswanathan
Author Index
A Generalized Wiener Attack on RSA / Johannes Blömer ; Alexander May
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem / Jean-Sébastien Coron
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism / Roberto Maria Avanzi ; Mathieu Ciet ; Francesco Sica
22.

電子ブック

EB
International Conference on Information and Communications Security, Robert Deng, Feng Bao, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2002
所蔵情報: loading…
23.

電子ブック

EB
Joonsang Baek, Feng Bao, Kefei Chen, Takeo Kanade, Xuejia Lai
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
24.

電子ブック

EB
Robert. Deng, Feng Bao, Weizhi Meng, Mark Ryan, Jian Shen, Ding Wang, Guilin Wang
出版情報: SpringerLink Books - AutoHoldings , Cham : Springer International Publishing AG, 2022
所蔵情報: loading…
25.

電子ブック

EB
Feng Bao
出版情報: SpringerLink Books - AutoHoldings , Springer Singapore, 2021
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼