Information security and cryptology: 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7763 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XII, 391 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 3642385184 9783642385186 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041089794 | ||
003 | DE-604 | ||
005 | 20141021 | ||
007 | t| | ||
008 | 130614s2013 xx ad|| |||| 10||| eng d | ||
015 | |a 13N18 |2 dnb | ||
016 | 7 | |a 1033976563 |2 DE-101 | |
020 | |a 3642385184 |c : Pb. : ca. EUR 66.34 (DE) |9 3-642-38518-4 | ||
020 | |a 9783642385186 |c : Pb. : ca. EUR 66.34 (DE) |9 978-3-642-38518-6 | ||
035 | |a (OCoLC)852506229 | ||
035 | |a (DE-599)DNB1033976563 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information security and cryptology |b 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers |c Mirosław Kutyłowski ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a XII, 391 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7763 | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Peking |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Kutyłowski, Mirosław |e Sonstige |0 (DE-588)1059797887 |4 oth | |
711 | 2 | |a Inscrypt |n 8 |d 2012 |c Peking |j Sonstige |0 (DE-588)1035845407 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-38519-3 |
830 | 0 | |a Lecture notes in computer science |v 7763 |w (DE-604)BV000000607 |9 7763 | |
856 | 4 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4305966&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026066404&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026066404 |
Datensatz im Suchindex
_version_ | 1820875462051627008 |
---|---|
adam_text |
IMAGE 1
T A B L E O F C O N T E N T S
ON THE MULTIPLE FAULT ATTACKS ON RSA SIGNATURES WITH LSBS OF MESSAGES
UNKNOWN 1
LIDONG HAN, WEI WEI, AND MINGJIE LIU
DIFFERENTIAL FAULT ANALYSIS OF TWOFISH 10
SK SUBIDH AH AND DEBDEEP MUKHOPADHYAY
IMPROVED DIFFERENTIAL CACHE ATTACKS ON SMS4 29
PLIUONG HA NGUYEN, CHESTER REBEIRO, DEBDEEP MUKHOPADHYAY, AND HUAXIONG
WANG
AN EXTENSION OF FAULT SENSITIVITY ANALYSIS BASED ON CLOCKWISE COLLISION
46
YANG LI, KAZUO OHTA, AND KAZUO SAKIYAMA
A ROBUST FUZZY EXTRACTOR WITHOUT ECCS 60
JINTAO YAO, KANGSHUN LI, MINGWU ZHANG, AND MIN ZHOU
AN EFFICIENT RATIONAL SECRET SHARING PROTOCOL RESISTING AGAINST
MALICIOUS ADVERSARIES OVER SYNCHRONOUS CHANNELS 69
YANG YU AND ZHANFEI ZHOU
VISUAL CRYPTOGRAPHY FOR NATURAL IMAGES AND VISUAL VOTING 90
TENG GUO, FENG LIU, AND CHUANKUN W U
RCCA SECURITY FOR K E M + D E M STYLE HYBRID ENCRYPTIONS 102
YUAN CHEN AND QINGKUAN DONG
EMBEDDED SURFACE ATTACK ON MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM
DIOPHANTINE EQUATIONS 122
JINTAI DING, A I REN, AND CHENGDONG TAO
VERIFIABLE STRUCTURED ENCRYPTION 137
MOESFA SOEHEILA MOHAMAD AND GEONG SEN POH
NESTED MERKLE'S PUZZLES AGAINST SAMPLING ATTACKS (EXTENDED ABSTRACT) 157
SHLOMI DOLEV, NOVA FANDINA, AND XIMING L I
OPTIMIZING GUESSING STRATEGIES FOR ALGEBRAIC CRYPTANALYSIS WITH
APPLICATIONS T O E P C B C 175
MICHAEL WALTER, STANISLAV BULYGIN, AND JOHANNES BUCHMANN
HTTP://D-NB.INFO/1033976563
IMAGE 2
XII TABLE OF CONTENTS
A GENERAL MODEL FOR MAC GENERATION USING DIRECT INJECTION 198
HARRY BARTLETT, MUFEED ALMASHRAFI, LEONIE SIMPSON, E D DAWSON, AND
KENNETH KOON-HO WONG
COLLISION ATTACKS ON VARIANT OF OCB MODE AND ITS SERIES 216
ZHELEI SUN, PENG WANG, AND LITING ZHANG
THE SECURITY AND PERFORMANCE OF "GCM" WHEN SHORT MULTIPLICATIONS ARE
USED INSTEAD 225
KAZUMARO AOKI AND K A N YASUDA
ESTIMATING RESISTANCE AGAINST MULTIDIMENSIONAL LINEAR ATTACKS: AN
APPLICATION ON DEAN 246
RISTO M. HAKALA, ATLE KIVELA, AND KAISA NYBERG
FAST EVALUATION OF T-FUNCTIONS VIA TIME-MEMORY TRADE-OFFS 263
TAO SHI, VLADIMIR ANASHIN, AND DONGDAI L I N
CONSTRUCTION OF RESILIENT AND NONLINEAR BOOLEAN FUNCTIONS WITH ALMOST
PERFECT IMMUNITY TO ALGEBRAIC AND FAST ALGEBRAIC ATTACKS 276
TIANZE WANG, MEICHENG LIU, AND DONGDAI L I N
AN IMPROVED TIME-MEMORY-DATA TRADE-OFF ATTACK AGAINST IRREGULARLY
CLOCKED AND FILTERED KEYSTREAM GENERATORS 294
LIN JIAO, MINGSHENG WANG, BIN ZHANG, AND YONGQIANG L I
NEW SEQUENCES OF PERIOD P N A N D P N + 1 VIA PROJECTIVE LINEAR GROUPS .
. . 311 L I N WANG AND ZHI H U
TOUCH GESTURES BASED BIOMETRIC AUTHENTICATION SCHEME FOR TOUCHSCREEN
MOBILE PHONES 331
YUXIN MENG, DUNCAN S. WONG, ROMAN SCHLEGEL, AND LAM-FOR KWOK
SECURE PRODUCT TRACKING IN SUPPLY CHAIN 351
MEHDI KHALFAOUI, REFIK MOLVA, AND LAURENT GOMEZ
T H E BUSSARD-BAGGA AND OTHER DISTANCE-BOUNDING PROTOCOLS UNDER ATTACKS
371
A S H BAY, IOANA BOUREANU, AIKATERINI MITROKOTSA, IOSIF SPULBER, AND
SERGE VAUDENAY
A U T H O R I N D E X 393 |
any_adam_object | 1 |
author_GND | (DE-588)1059797887 |
building | Verbundindex |
bvnumber | BV041089794 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)852506229 (DE-599)DNB1033976563 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041089794</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20141021</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">130614s2013 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13N18</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1033976563</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642385184</subfield><subfield code="c">: Pb. : ca. EUR 66.34 (DE)</subfield><subfield code="9">3-642-38518-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642385186</subfield><subfield code="c">: Pb. : ca. EUR 66.34 (DE)</subfield><subfield code="9">978-3-642-38518-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)852506229</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1033976563</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security and cryptology</subfield><subfield code="b">8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers</subfield><subfield code="c">Mirosław Kutyłowski ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 391 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7763</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kutyłowski, Mirosław</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1059797887</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Inscrypt</subfield><subfield code="n">8</subfield><subfield code="d">2012</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1035845407</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-38519-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7763</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7763</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4305966&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026066404&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026066404</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Peking gnd-content |
genre_facet | Konferenzschrift 2012 Peking |
id | DE-604.BV041089794 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:16:01Z |
institution | BVB |
institution_GND | (DE-588)1035845407 |
isbn | 3642385184 9783642385186 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026066404 |
oclc_num | 852506229 |
open_access_boolean | |
owner | DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XII, 391 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security and cryptology 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers Mirosław Kutyłowski ... (eds.) Berlin [u.a.] Springer 2013 XII, 391 S. Ill., graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7763 Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Peking gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Kryptoanalyse (DE-588)4830502-9 s Kutyłowski, Mirosław Sonstige (DE-588)1059797887 oth Inscrypt 8 2012 Peking Sonstige (DE-588)1035845407 oth Erscheint auch als Online-Ausgabe 978-3-642-38519-3 Lecture notes in computer science 7763 (DE-604)BV000000607 7763 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4305966&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026066404&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security and cryptology 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers Lecture notes in computer science Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4033329-2 (DE-588)1071861417 |
title | Information security and cryptology 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers |
title_auth | Information security and cryptology 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers |
title_exact_search | Information security and cryptology 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers |
title_full | Information security and cryptology 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers Mirosław Kutyłowski ... (eds.) |
title_fullStr | Information security and cryptology 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers Mirosław Kutyłowski ... (eds.) |
title_full_unstemmed | Information security and cryptology 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers Mirosław Kutyłowski ... (eds.) |
title_short | Information security and cryptology |
title_sort | information security and cryptology 8th international conference inscrypt 2012 beijing china november 28 30 2012 revised selected papers |
title_sub | 8th international conference, Inscrypt 2012, Beijing, China, November 28 - 30, 2012 ; revised selected papers |
topic | Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptoanalyse Kryptosystem Kryptologie Konferenzschrift 2012 Peking |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4305966&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026066404&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kutyłowskimirosław informationsecurityandcryptology8thinternationalconferenceinscrypt2012beijingchinanovember28302012revisedselectedpapers AT inscryptpeking informationsecurityandcryptology8thinternationalconferenceinscrypt2012beijingchinanovember28302012revisedselectedpapers |