close
1.

図書

東工大
目次DB

図書
東工大
目次DB
Feng Bao, Robert Deng, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xi, 454 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2947
所蔵情報: loading…
目次情報: 続きを見る
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point Pradeep Kumar Mishra and Palash Sarkar 41
Fast Arithmetic on Jacobians of Picard Curves Stephane Flon and Roger Oyono 55
Undeniable Signatures Based on Characters: How to Sign with One Bit Jean Monnerat and Serge Vaudenay 69
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, and Josef Pieprzyk 86
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model Huafei Zhu 101
Constant Round Authenticated Group Key Agreement via Distributed Computation Emmanuel Bresson and Dario Catalano 115
Efficient ID-based Group Key Agreement with Bilinear Maps Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee 130
New Security Results on Encrypted Key Exchange Emmanuel Bresson, Olivier Chevassut, and David Pointcheval 145
New Results on the Hardness of Diffie-Hellman Bits Maria Isabel Gonzalez Vasco, Mats Naeslung, and Igor E. Shparlinski 159
Short Exponent Diffie-Hellman Problems Takeshi Koshiba and Kaoru Kurosawa 173
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups Benoit Libert and Jean-Jacques Quisquater 187
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 Nicolas T. Courtois 201
Secret Exponent Attacks on RSA-type Schemes with Moduli N=Prq Alexander May 218
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" Reihaneh Safavi-Naini, Luke McAven, and Moti Yung 231
From Digital Signature to ID-based Identification/Signature Kaoru Kurosawa and Swee-Huay Heng 248
Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 262
An Efficient Signature Scheme from Bilinear Pairings and Its Applications Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo 277
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka 291
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation Jintai Ding 305
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability Jun Furukawa 319
A Point Compression Method for Elliptic Curves Defined over GF(2n) Brian King 333
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny Toru Akishita and Tsuyoshi Takagi 346
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, and Hideki Imai 360
QuasiModo: Efficient Certificate Validation and Revocation Farid F. Elwailly, Craig Gentry, and Zulfikar Ramzan 375
A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga and Kouichi Sakurai 389
A First Approach to Provide Anonymity in Attribute Certificates Vicente Benjumea, Javier Lopez, Jose A. Montenegro, and Jose M. Troya 402
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups Igor E. Shparlinski and Arne Winterhof 416
Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, and Helger Lipmaa 425
A Correct, Private, and Efficient Mix Network Kun Peng, Colin Boyd, Ed Dawson, and Kapali Viswanathan 439
Author Index 455
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
2.

図書

図書
Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xi, 416 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2836
所蔵情報: loading…
目次情報: 続きを見る
A Fast Square Root Computation Using the Frobenius Mapping / Wang Feng ; Yasuyuki Nogami ; Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption / Dang Nguyen Duc ; Jung Hee Cheon ; Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents / Yan Wang ; Chi-Hung Chi ; Tieyan Li
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST / Duncan S. Wong ; Karyin Fung ; Joseph K. Liu ; Victor K. Wei
A Policy Based Framework for Access Control / Ricardo Nabhen ; Edgard Jamhour ; Carlos Maziero
Trading-Off Type-Inference Memory Complexity against Communication / Konstantin Hyppönen ; David Naccache ; Elena Trichina ; Alexei Tchoulkine
Security Remarks on a Group Signature Scheme with Member Deletion / Guilin Wang ; Feng Bao ; Jianying Zhou ; Robert H. Deng
An Efficient Known Plaintext Attack on FEA-M / Hongjun Wu
An Efficient Public-Key Framework / Robert Deng
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature / Jong-Phil Yang ; Chul Sur ; Kyung Hyune Rhee
Practical Service Charge for P2P Content Distribution / Jose Antonio Onieva ; Javier Lopez
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback / Henry C.J. Lee ; Vrizlynn L.L. Thing ; Yi Xu ; Miao Ma
A Lattice Based General Blind Watermark Scheme / Yongliang Liu ; Wen Gao ; Zhao Wang ; Shaohui Liu
Role-Based Access Control and the Access Control Matrix / Gregory Saunders ; Michael Hitchens ; Vijay Varadharajan
Broadcast Encryption Schemes Based on the Sectioned Key Tree / Miodrag J. Mihaljevic
Research on the Collusion Estimation / Gang Li ; Jie Yang
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains / Mohsen Ashourian ; Yo-Sung Ho
Protocols for Malicious Host Revocation / Oscar Esparza ; Miguel Soriano ; Jose L. Muñoz ; Jordi Forne
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code / Pik-Wah Chan ; Michael R. Lyu
A Novel Two-Level Trust Model for Grid / Tie-Yan Li ; HuaFei Zhu ; Kwok-Yan Lam
Practical t-out-n Oblivious Transfer and Its Applications / Qian-Hong Wu ; Jian-Hong Zhang ; Yu-Min Wang
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme / Yongdong Wu
ID-Based Distributed "Magic Ink" Signature from Pairings / Yan Xie ; Fangguo Zhang ; Xiaofeng Chen
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature / Shuwang Lü ; Zhenhua Liu
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives / Yang Cui ; Kazukuni Kobara ; Hideki Imai
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems / Xiao-dong Yi ; Xue-jun Yang
A Novel Efficient Group Signature Scheme with Forward Security / Jianhong Zhang ; Qianhong Wu ; Yumin Wang
Variations of Diffie-Hellman Problem
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine / Taeshik Sohn ; JungTaek Seo ; Jongsub Moon
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine / Min Luo ; Lina Wang ; Huanguo Zhang ; Jin Chen
UC-RBAC: A Usage Constrained Role-Based Access Control Model / Zhen Xu ; Dengguo Feng ; Lan Li ; Hua Chen
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography / Mathieu Ciet ; Marc Joye
An Optimized Multi-bits Blind Watermarking Scheme / Xiaoqiang Li ; Xiangyang Xue ; Wei Li
A Compound Intrusion Detection Model / Jianhua Sun ; Hai Jin ; Hao Chen ; Qian Zhang ; Zongfen Han
An Efficient Convertible Authenticated Encryption Scheme and Its Variant / Hui-Feng Huang ; Chin-Chen Chang
Space-Economical Reassembly for Intrusion Detection System / Meng Zhang ; Jiu-bin Ju
A Functional Decomposition of Virus and Worm Programs / J. Krishna Murthy
Author Index
A Fast Square Root Computation Using the Frobenius Mapping / Wang Feng ; Yasuyuki Nogami ; Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption / Dang Nguyen Duc ; Jung Hee Cheon ; Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents / Yan Wang ; Chi-Hung Chi ; Tieyan Li
3.

図書

図書
Jianying Zhou, Moti Yung, Yongfei Han, (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xi, 436 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2846
所蔵情報: loading…
目次情報: 続きを見る
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji
Anonymity-Enhanced Pseudonym System / Yuko Tamura
Intrusion Detection
Using Feedback to Improve Masquerade Detection / Kwong H. Yung
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services / Zhi Guo ; Kwok-Yan Lam ; Siu-Leung Chung ; Ming Gu ; Jia-Guang Sun
An IP Traceback Scheme Integrating DPM and PPM / Fan Min ; Jun-yan Zhang ; Guo-wie Yang
Cryptographic Algorithms
Improved Scalable Hash Chain Traversal / Sung-Ryul Kim
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem / Rui Zhang ; Hideki Imai
On the Security of Two Threshold Signature Schemes with Traceable Signers / Guilin Wang ; Xiaoxi Han ; Bo Zhu
Digital Signature
Proxy and Threshold One-Time Signatures / Mohamed Al-Ibrahim ; Anton Cerny
A Threshold GQ Signature Scheme / Li-Shan Liu ; Cheng-Kang Chu ; Wen-Guey Tzeng
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary / Gene Itkis ; Peng Xie
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme / Chong-zhi Gao ; Zheng-an Yao ; Lei Li
Security Modelling
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems / Ching Lin ; Vijay Varadharajan
An Authorization Model for E-consent Requirement in a Health Care Application / Chun Ruan
PLI: A New Framework to Protect Digital Content for P2P Networks / Guofei Gu ; Bin B. Zhu ; Shipeng Li ; Shiyong Zhang
Web Security
Improved Algebraic Traitor Tracing Scheme / Chunyan Bai ; Guiliang Feng
Common Vulnerability Markup Language / Haitao Tian ; Liusheng Huang ; Zhi Zhou ; Hui Zhang
Trust on Web Browser: Attack vs. Defense / Tie-Yan Li ; Yongdong Wu
Security Protocols
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards / Luciano Rila ; Chris J. Mitchell
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party / Jae-Gwi Choi ; Kouichi Sakurai ; Ji-Hwan Park
Using OCSP to Secure Certificate-Using Transactions in M-commerce / Jose L. Muñoz ; Jordi Forné ; Oscar Esparza ; Bernabe Miguel Soriano
Cryptanalysis
Differential Fault Analysis on A.E.S / Pierre Dusart ; Gilles Letourneux ; Olivier Vivolo
Side-Channel Attack on Substitution Blocks / Roman Novak
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation / Yasuyuki Sakai
A Fast Correlation Attack for LFSR-Based Stream Ciphers / Sarbani Palit ; Bimal K. Roy ; Arindom De
Key Management
Making the Key Agreement Protocol in Mobile Ad Hoc Network
More Efficient / Gang Yao ; Kui Ren ; Feng Bao ; Robert H. Deng ; Dengguo Feng
An Efficient Tree-Based Group Key Agreement Using Bilinear Map / Sangwon Lee ; Yongdae Kim ; Kwangjo Kim ; Dae-Hyun Ryu
A Key Recovery Mechanism for Reliable Group Key Management / Taenam Cho ; Sang-Ho Lee
Efficient Implementations
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model / Sandeepan Chowdhury ; Subhamoy Maitra
Efficient Distributed Signcryption Scheme as Group Signcryption / DongJin Kwak ; SangJae Moon
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors / Johann Großschädl ; Guy-Armand Kamendje
Author Index
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji
4.

図書

図書
Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
出版情報: Berlin : Springer, c2001  xiv, 504 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2229
所蔵情報: loading…
目次情報: 続きを見る
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
Unconditionally-Secure Oblivious Transfer / Bo Yan ; Shixiong Zhu ; Yumin Wang
Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang ; Iuon-Chang Lin
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Kuo-Feng Hwang
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo ; Lincheng Shen ; Wensen Chang
A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki ; Fumitaka Hoshino ; Tetsutaro Kobayashi
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang ; Futai Zhang
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye ; Junhui Yang ; Zongduo Dai ; Haiwen Ou
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura
A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim ; Hae-Kyung Rhee ; Tai M. Chung ; Young Ik Eom ; Ung-Mo Kim
Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho ; Zbigniew Ciechanowicz
RBAC for XML Document Stores / Michael Hitchens ; Vijay Varadharajan
Cheating Immune Secret Sharing / Xian-Mo Zhang ; JosefPieprzyk
Encryption Sticks (Randomats) / Gideon Samid
Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song ; Sihan Qing
Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono ; Ingo Liebhardt
Enforcing Obligation with Security Monitors / Carlos Ribeiro ; Andre Zuquete ; Paulo Ferreira
Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning ; Yiqun Lisa Yin
Playing Lottery on the Internet / Jianying Zhou ; Chunfu Tan
Privacy Protection for Transactions of Digital Goods / Feng Bao ; Robert Deng
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lua Xu ; Han-liang Xu ; Yan Wang ; Shu-Wang Lu
Threshold Undeniable RSA Signature Scheme / Guilin Wang ; Mingsheng Wang ; Zhanfei Zhou
Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang ; Cheng-Chi Lee ; Yuan-Liang Tang
Square Attack on Reduced Camellia Cipher / Yeping He
Generalization of Elliptic Curve Digital Signature Schemes / Lin You ; Yi Xian Yang ; Chun Qi Zhang
Reasoning about Accountability within Delegation / Bruno Crispo ; Giancarlo Ruffo
A Novel Data Hiding Method for Two-Color Images / Gang Pan ; Yijun Wu ; Zhaohui Wu
An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee ; X. Deng ; H. Zhu
Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu ; Yoshiaki Takata ; Hiroyuki Seki ; Katsuro Inoue
Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang ; Harald Lukhaub ; Werner Zorn
A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp ; Chaiwat Rujimethabhas
Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen ; Adam Bargteil ; David Bindel ; Randy H. Katz ; John Kubiatowicz
A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto ; Colin Boyd ; Ed Dawson
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong ; Chul Kim
NIDS Research Based on Artificial Immunology / Wenjian Luo ; Xianbin Cao ; Xufa Wang
AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Cánovas ; Antonio F. Gómez
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou ; Byrav Ramamurthy ; Spyros S. Magliveras
Dispatching Mobile Agents with Secure Routes in Parallel / Kian-Lee Tan
TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen ; Qian Fang ; Zhihui Du ; Zhenchun Huang ; Sanli Li
Cryptography and Middleware Security / Ulrich Lang ; Dieter Gollmann ; Rudolf Schreiner
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng ; Chung-Huang Yang ; T.R.N. Rao
A Role-Based Model for Access Control in Database Federations / Eric Disson ; Danielle Boulanger ; Gilles Dubois
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li ; Lianli Chang ; Xinmei Wang
A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park ; Im-Yeong Lee
Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi ; Tae Ho Cho
Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland
Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu
SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park ; Jang-Se Lee ; Hwan Kuk Kim ; Jeong-Rye Jeong ; Dong-Bok Yeom ; Sung-Do Chi
A New Semantics of Authentication Logic / Yifa Li
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park ; Sook Ee Jeong ; Chang Soo Kim
Redundancy, Obscurity, Self-Containment & Independence / Seenil Gram
Author Index
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
5.

図書

図書
Jianying Zhou, Moti Yung, Feng Bao (eds.)
出版情報: Berlin : Springer, c2006  xiv, 488 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3989
所蔵情報: loading…
6.

図書

図書
Kefei Chen ... [et al.] (eds.)
出版情報: Berlin : Springer, c2006  xiv, 392 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3903
所蔵情報: loading…
7.

図書

図書
Jianying Zhou ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xii, 516 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3650
所蔵情報: loading…
8.

図書

図書
Markus Jakobsson, Moti Yung, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xiv, 510 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3089
所蔵情報: loading…
9.

図書

図書
Robert H. Deng ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xii, 424 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3439
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼