default search action
10. ICISC 2007: Seoul, Korea
- Kil-Hyun Nam, Gwangsoo Rhee:
Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings. Lecture Notes in Computer Science 4817, Springer 2007, ISBN 978-3-540-76787-9
Cryptanalysis - I
- Willi Geiselmann, Rainer Steinwandt:
Cryptanalysis of a Hash Function Proposed at ICISC 2006. 1-10 - Jiqiang Lu:
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. 11-26 - Antoine Scemama:
A Cryptanalysis of the Double-Round Quadratic Cryptosystem. 27-36
Access Control
- Jangseong Kim, Zeen Kim, Kwangjo Kim:
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment. 37-48 - Jinwei Hu, Ruixuan Li, Zhengding Lu:
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments. 49-63 - Li Jiang, Lingdi Ping, Xuezeng Pan:
Handling Dynamic Information Release. 64-76
Cryptanalysis - II
- Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Improving the Time Complexity of Matsui's Linear Cryptanalysis. 77-88 - Alexander Maximov:
On Large Distributions for Linear Cryptanalysis. 89-101 - Basel Alomair, Loukas Lazos, Radha Poovendran:
Passive Attacks on a Class of Authentication Protocols for RFID. 102-115 - Chuan-Wen Loe, Khoongming Khoo:
Side Channel Attacks on Irregularly Decimated Generators. 116-130
System Security
- Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. 131-143 - Jesus Molina, Xavier Chorin, Michel Cukier:
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. 144-155 - Yan Wen, Huaimin Wang:
A Secure Virtual Execution Environment for Untrusted Code. 156-167
Biometrics
- Changlong Jin, Hakil Kim, Stephen J. Elliott:
Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum. 168-179
Cryptographic Protocols
- Palash Sarkar:
Improving Upon the TET Mode of Operation. 180-192
Hash Functions - I
- Somitra Kumar Sanadhya, Palash Sarkar:
New Local Collisions for the SHA-2 Hash Family. 193-205 - Hongbo Yu, Xiaoyun Wang:
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. 206-226
Block and Stream Ciphers
- Haina Zhang, Xiaoyun Wang:
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. 227-238 - Wentao Zhang, Wenling Wu, Dengguo Feng:
New Results on Impossible Differential Cryptanalysis of Reduced AES. 239-250
Copyright Protection
- Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo:
A Note About the Traceability Properties of Linear Codes. 251-258
Smart Cards
- Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani:
Power Analysis Attacks on MDPL and DRSL Implementations. 259-272 - Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee:
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. 273-281
Elliptic Curve Cryptosystems
- Atsuko Miyaji:
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. 282-296 - Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi:
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. 297-308
Hash Functions - II
- Jean-Philippe Aumasson, Willi Meier:
Analysis of Multivariate Hash Functions. 309-323 - Florian Mendel, Vincent Rijmen:
Colliding Message Pair for 53-Step HAS-160. 324-334 - Florian Mendel, Vincent Rijmen:
Weaknesses in the HAS-V Compression Function. 335-345
Authentication and Authorization
- Raphael C.-W. Phan, Serge Vaudenay:
Security-Preserving Asymmetric Protocol Encapsulation. 346-366
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.