close
1.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
2.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
3.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
4.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼