close
1.

電子ブック

EB
Aggelos Kiayias, Serdar Pehlivanoglu
出版情報: Springer eBooks Computer Science , Springer US, 2010
所蔵情報: loading…
目次情報: 続きを見る
Preface
Encryption Mechanisms for Content Distribution
Combinatorial Methods for Broadcast Encryption
Complexity of Trace and Revoking
Pirate Evolution Attacks
Stronger Adversaries
Index
Preface
Encryption Mechanisms for Content Distribution
Combinatorial Methods for Broadcast Encryption
2.

電子ブック

EB
Moti Yung, Yevgeniy Dodis, Takeo Kanade, Aggelos Kiayias, Tal Malkin
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
3.

電子ブック

EB
Radu Sion, Reza Curtmola, Sven Dietrich, Takeo Kanade, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Seb?
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
WLC Preface / Josep M. Miret ; Francesc Sebé
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices / Daniel Engels ; Xinxin Fan ; Guang Gong ; Honggang Hu ; Eric M. Smith
Lighten Encryption Schemes for Secure and Private RFID Systems / Sébastien Canard ; Iwen Coisel ; Jonathan Etrog
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags / J. Melia-Segui ; J. Garcia-Alfaro ; J. Herrera-Joancomarti
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results / Jin Tamura ; Kazukuni Kobara ; Hanane Fathi ; Hideki Imai
Reliable Food Traceability Using RFID Tagging / Guillermo Azuara ; José L. Salazar ; José L. Tornos ; Joan J. Piles
Lightweight Cryptography and DPA Countermeasures: A Survey / Amir Moradi ; Axel Poschmann
Securing the Use of RFID-Enabled Banknotes / Santi Martínez ; Concepció Roig ; Magda Valls
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports / Vincenzo Auletta ; Carlo Blundo ; Angelo De Caro ; Emiliano De Cristofaro ; Giuseppe Persiano ; Ivan Visconti
RLCPS Preface / Aggelos Kiayias ; Kazue Sako
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications / Jean-Sébastien Coron ; Aline Gouget ; Pascal Paillier ; Karine Villegas
A Secure and Privacy-Preserving Targeted Ad-System / Elli Androulaki ; Steven M. Bellovin
Cryptographic Cloud Storage / Seny Kamara ; Kristin Lauter
Extending IPsec for Efficient Remote Attestation / Ahmad-Reza Sadeghi ; Steffen Schulz
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions / David William Kravitz
How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTREC / Shin'ichiro Matsuo ; Kunihiko Miyazaki ; Akira Otsuka ; David Basin
WECSR Preface / Sven Dietrich
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk) / Kenneth R. Fleischmann
A Case Study on Measuring Statistical Data in the Tor Anonymity Network / Karsten Loesing ; Steven J. Murdoch ; Roger Dingledine
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets / David Dittrich ; Felix Leder ; Tillmann Werner
Ethical Proactive Threat Research (Position Paper) / John Aycock ; John Sullins
A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper) / Erin Kenneally ; Michael Bailey ; Douglas Maughan
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel) / Lorrie Faith Cranor
Ethical Guidelines for Computer Security Researchers: "Be Reasonable" (Panel) / Len Sassaman
Author Index
WLC Preface / Josep M. Miret ; Francesc Sebé
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices / Daniel Engels ; Xinxin Fan ; Guang Gong ; Honggang Hu ; Eric M. Smith
Lighten Encryption Schemes for Secure and Private RFID Systems / Sébastien Canard ; Iwen Coisel ; Jonathan Etrog
4.

電子ブック

EB
Aggelos Kiayias, Takeo Kanade
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Secure Two-Party Computation
Secure Set Intersection with Untrusted Hardware Tokens / Marc Fischlin ; Benny Pinkas ; Ahmad-Reza Sadeghi ; Thomas Schneider ; Ivan Visconti
Efficient Secure Two-Party Exponentiation / Ching-Hua Yu ; Sherman S.M. Chow ; Kai-Min Chung ; Feng-Hao Liu
Cryptographic Primitives
A General, Flexible and Efficient Proof of Inclusion and Exclusion / Kun Peng
Non-interactive Confirmer Signatures / Kristiyan Haralambiev
Communication-Efficient 2-Round Group Key Establishment from Pairings / Kashi Neupane ; Rainer Steinwandt
Side Channel Attacks
Defeating RSA Multiply-Always and Message Blinding Countermeasures / Marc F. Witteman ; Jasper G.J. van Woudenberg ; Federico Menarini
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns / Chester Rebeiro ; Debdeep Mukhopadhyay
Improving Differential Power Analysis by Elastic Alignment / Bram Bakker
Invited Talk
NSA's Role in the Development of DES / Richard M. George
Authenticated Key Agreement
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys / Atsushi Fujioka ; Koutarou Suzuki
Contributory Password-Authenticated Group Key Exchange with Join Capability / Michel Abdalla ; Céline Chevalier ; Louis Granboulan ; David Pointcheval
Proofs of Security
Ideal Key Derivation and Encryption in Simulation-Based Security / Ralf Küsters ; Max Tuengerthal
Beyond Provable Security Verifiable IND-CCA Security of OAEP / Gilles Barthe ; Benjamin Grégoire ; Yassine Lakhnech ; Santiago Zanella Béguelin
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach / Lei Wang ; Yu Sasaki ; Wataru Komatsubara ; Kazuo Ohta ; Kazuo Sakiyama
MJH: A Faster Alternative to MDC-2 / Jooyung Lee ; Martijn Stam
Block Ciphers
Online Ciphers from Tweakable Blockciphers / Phillip Rogaway ; Haibin Zhang
Meet-in-the-Middle Attacks on Reduced-Round XTEA / Gautham Sekar ; Nicky Mouha ; Vesselin Velichkov ; Bart Preneel
Security Notions
Expedient Non- malleability Notions for Hash Functions / Paul Baecher ; Dominique Schröder
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols / Douglas Stebila ; Lakshmi Kuppusamy ; Jothi Rangasamy ; Colin Boyd ; Juan Gonzalez Nieto
Public-Key Encryption
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes / Joonsang Baek ; Cheng-Kang Chu ; Jianying Zhou
Better Key Sizes (and Attacks) for LWE-Based Encryption / Richard Lindner ; Chris Peikert
Crypto Tools and Parameters
Binary Huff Curves / Julien Devigne ; Marc Joye
A Variant of the F4 Algorithm / Antoine Joux ; Vanessa Vitse
Attribute-Based Signatures / Hemanta K. Maji ; Manoj Prabhakaran ; Mike Rosulek
Digital Signatures
Sub-linear Size Traceable Ring Signatures without Random Oracles / Eiichiro Fujisaki
Author Index
Secure Two-Party Computation
Secure Set Intersection with Untrusted Hardware Tokens / Marc Fischlin ; Benny Pinkas ; Ahmad-Reza Sadeghi ; Thomas Schneider ; Ivan Visconti
Efficient Secure Two-Party Exponentiation / Ching-Hua Yu ; Sherman S.M. Chow ; Kai-Min Chung ; Feng-Hao Liu
5.

図書

図書
Moti Yung ... [et al.] (eds.)
出版情報: Berlin : Springer, c2006  xiv, 542 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3958
所蔵情報: loading…
6.

電子ブック

EB
Gritzalis, Ioannis Askoxylakis, Aggelos Kiayias
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2014
所蔵情報: loading…
7.

電子ブック

EB
Radu Sion, Reza Curtmola, Sven Dietrich, Takeo Kanade, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
WLC Preface / Josep M. Miret ; Francesc Sebé
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices / Daniel Engels ; Xinxin Fan ; Guang Gong ; Honggang Hu ; Eric M. Smith
Lighten Encryption Schemes for Secure and Private RFID Systems / Sébastien Canard ; Iwen Coisel ; Jonathan Etrog
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags / J. Melia-Segui ; J. Garcia-Alfaro ; J. Herrera-Joancomarti
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results / Jin Tamura ; Kazukuni Kobara ; Hanane Fathi ; Hideki Imai
Reliable Food Traceability Using RFID Tagging / Guillermo Azuara ; José L. Salazar ; José L. Tornos ; Joan J. Piles
Lightweight Cryptography and DPA Countermeasures: A Survey / Amir Moradi ; Axel Poschmann
Securing the Use of RFID-Enabled Banknotes / Santi Martínez ; Concepció Roig ; Magda Valls
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports / Vincenzo Auletta ; Carlo Blundo ; Angelo De Caro ; Emiliano De Cristofaro ; Giuseppe Persiano ; Ivan Visconti
RLCPS Preface / Aggelos Kiayias ; Kazue Sako
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications / Jean-Sébastien Coron ; Aline Gouget ; Pascal Paillier ; Karine Villegas
A Secure and Privacy-Preserving Targeted Ad-System / Elli Androulaki ; Steven M. Bellovin
Cryptographic Cloud Storage / Seny Kamara ; Kristin Lauter
Extending IPsec for Efficient Remote Attestation / Ahmad-Reza Sadeghi ; Steffen Schulz
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions / David William Kravitz
How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTREC / Shin'ichiro Matsuo ; Kunihiko Miyazaki ; Akira Otsuka ; David Basin
WECSR Preface / Sven Dietrich
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk) / Kenneth R. Fleischmann
A Case Study on Measuring Statistical Data in the Tor Anonymity Network / Karsten Loesing ; Steven J. Murdoch ; Roger Dingledine
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets / David Dittrich ; Felix Leder ; Tillmann Werner
Ethical Proactive Threat Research (Position Paper) / John Aycock ; John Sullins
A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper) / Erin Kenneally ; Michael Bailey ; Douglas Maughan
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel) / Lorrie Faith Cranor
Ethical Guidelines for Computer Security Researchers: "Be Reasonable" (Panel) / Len Sassaman
Author Index
WLC Preface / Josep M. Miret ; Francesc Sebé
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices / Daniel Engels ; Xinxin Fan ; Guang Gong ; Honggang Hu ; Eric M. Smith
Lighten Encryption Schemes for Secure and Private RFID Systems / Sébastien Canard ; Iwen Coisel ; Jonathan Etrog
8.

電子ブック

EB
Aggelos Kiayias, Serdar Pehlivanoglu
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2010
所蔵情報: loading…
目次情報: 続きを見る
Preface
Encryption Mechanisms for Content Distribution
Combinatorial Methods for Broadcast Encryption
Complexity of Trace and Revoking
Pirate Evolution Attacks
Stronger Adversaries
Index
Preface
Encryption Mechanisms for Content Distribution
Combinatorial Methods for Broadcast Encryption
9.

電子ブック

EB
Aggelos Kiayias, Takeo Kanade, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Secure Two-Party Computation
Secure Set Intersection with Untrusted Hardware Tokens / Marc Fischlin ; Benny Pinkas ; Ahmad-Reza Sadeghi ; Thomas Schneider ; Ivan Visconti
Efficient Secure Two-Party Exponentiation / Ching-Hua Yu ; Sherman S.M. Chow ; Kai-Min Chung ; Feng-Hao Liu
Cryptographic Primitives
A General, Flexible and Efficient Proof of Inclusion and Exclusion / Kun Peng
Non-interactive Confirmer Signatures / Kristiyan Haralambiev
Communication-Efficient 2-Round Group Key Establishment from Pairings / Kashi Neupane ; Rainer Steinwandt
Side Channel Attacks
Defeating RSA Multiply-Always and Message Blinding Countermeasures / Marc F. Witteman ; Jasper G.J. van Woudenberg ; Federico Menarini
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns / Chester Rebeiro ; Debdeep Mukhopadhyay
Improving Differential Power Analysis by Elastic Alignment / Bram Bakker
Invited Talk
NSA's Role in the Development of DES / Richard M. George
Authenticated Key Agreement
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys / Atsushi Fujioka ; Koutarou Suzuki
Contributory Password-Authenticated Group Key Exchange with Join Capability / Michel Abdalla ; Céline Chevalier ; Louis Granboulan ; David Pointcheval
Proofs of Security
Ideal Key Derivation and Encryption in Simulation-Based Security / Ralf Küsters ; Max Tuengerthal
Beyond Provable Security Verifiable IND-CCA Security of OAEP / Gilles Barthe ; Benjamin Grégoire ; Yassine Lakhnech ; Santiago Zanella Béguelin
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach / Lei Wang ; Yu Sasaki ; Wataru Komatsubara ; Kazuo Ohta ; Kazuo Sakiyama
MJH: A Faster Alternative to MDC-2 / Jooyung Lee ; Martijn Stam
Block Ciphers
Online Ciphers from Tweakable Blockciphers / Phillip Rogaway ; Haibin Zhang
Meet-in-the-Middle Attacks on Reduced-Round XTEA / Gautham Sekar ; Nicky Mouha ; Vesselin Velichkov ; Bart Preneel
Security Notions
Expedient Non- malleability Notions for Hash Functions / Paul Baecher ; Dominique Schröder
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols / Douglas Stebila ; Lakshmi Kuppusamy ; Jothi Rangasamy ; Colin Boyd ; Juan Gonzalez Nieto
Public-Key Encryption
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes / Joonsang Baek ; Cheng-Kang Chu ; Jianying Zhou
Better Key Sizes (and Attacks) for LWE-Based Encryption / Richard Lindner ; Chris Peikert
Crypto Tools and Parameters
Binary Huff Curves / Julien Devigne ; Marc Joye
A Variant of the F4 Algorithm / Antoine Joux ; Vanessa Vitse
Attribute-Based Signatures / Hemanta K. Maji ; Manoj Prabhakaran ; Mike Rosulek
Digital Signatures
Sub-linear Size Traceable Ring Signatures without Random Oracles / Eiichiro Fujisaki
Author Index
Secure Two-Party Computation
Secure Set Intersection with Untrusted Hardware Tokens / Marc Fischlin ; Benny Pinkas ; Ahmad-Reza Sadeghi ; Thomas Schneider ; Ivan Visconti
Efficient Secure Two-Party Exponentiation / Ching-Hua Yu ; Sherman S.M. Chow ; Kai-Min Chung ; Feng-Hao Liu
10.

電子ブック

EB
Moti Yung, Yevgeniy Dodis, Takeo Kanade, Aggelos Kiayias, Tal Malkin
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼