Information Security and Cryptology - ICISC 2010 : 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers 🔍
Alexandre Venelli (auth.), Kyung-Hyune Rhee, DaeHun Nyang (eds.) Springer-Verlag GmbH Berlin Heidelberg, Lecture Notes in Computer Science, Lecture Notes in Computer Science 6829, 1, 2011
英语 [en] · PDF · 6.0MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
描述
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.
Erscheinungsdatum: 23.09.2011
备用文件名
nexusstc/Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers/bcda6a0e78487c9f90ccf03de4befe20.pdf
备用文件名
lgli/_487502.bcda6a0e78487c9f90ccf03de4befe20.pdf
备用文件名
lgrsnf/_487502.bcda6a0e78487c9f90ccf03de4befe20.pdf
备用文件名
scihub/10.1007/978-3-642-24209-0.pdf
备用文件名
zlib/Computers/Networking/Alexandre Venelli (auth.), Kyung-Hyune Rhee, DaeHun Nyang (eds.)/Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers_1227306.pdf
备选标题
Information security and cryptology - ISISC 2010 : 13th international conference, Seoul, Korea, December 1-3, 2010 : revised selected papers
备选作者
Kyung-Hyune Rhee; DaeHun Nyang; International Conference on Information Security and Cryptology, ICISC
备选作者
edited by Kyung-Hyune Rhee, DaeHun Nyang
备选作者
ICISC (Conference); ICISC 2010
备选作者
Rhee, Kyung-hyune /
备用出版商
Spektrum Akademischer Verlag. in Springer-Verlag GmbH
备用出版商
Springer Berlin Heidelberg : Imprint: Springer
备用出版商
Steinkopff. in Springer-Verlag GmbH
备用出版商
Springer-Verlag New York Inc
备用出版商
Springer Nature
备用版本
Lecture notes in computer science. Security and cryptology, 6829, Berlin ; London, 2011
备用版本
Lecture Notes in Computer Science -- 6829, Berlin, Heidelberg, Germany, 2011
备用版本
Security and Cryptology, 6829, 1st ed. 2011, Berlin, Heidelberg, 2011
备用版本
Lecture notes in computer science, 6829, Berlin ; New York, ©2011
备用版本
LNCS sublibrary, 6829, 1st ed, Berlin, Heidelberg, 2011
备用版本
Springer Nature, Berlin, Heidelberg, 2011
备用版本
Germany, Germany
备用版本
1, 20110830
元数据中的注释
lg966545
元数据中的注释
{"container_title":"Lecture Notes in Computer Science","edition":"1","isbns":["3642242081","364224209X","9783642242083","9783642242090"],"issns":["0302-9743","1611-3349"],"last_page":435,"publisher":"Springer","series":"Lecture Notes in Computer Science 6829"}
元数据中的注释
MiU
备用描述
Front Matter....Pages -
Analysis of Nonparametric Estimation Methods for Mutual Information Analysis....Pages 1-15
Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher....Pages 16-28
Known and Chosen Key Differential Distinguishers for Block Ciphers....Pages 29-48
Related-Key Attack on the Full HIGHT....Pages 49-67
Preimage Attacks against PKC98-Hash and HAS-V....Pages 68-91
Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems....Pages 92-103
Cryptanalysis of RSA with Small Prime Combination....Pages 104-112
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications....Pages 113-132
Group Signatures are Suitable for Constrained Devices....Pages 133-150
A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW....Pages 151-168
Efficient Pairing Computation on Elliptic Curves in Hessian Form....Pages 169-176
FPGA Implementation of an Improved Attack against the DECT Standard Cipher....Pages 177-188
Chameleon: A Versatile Emulator for Contactless Smartcards....Pages 189-206
Revisiting Address Space Randomization....Pages 207-221
Evaluation of a Spyware Detection System Using Thin Client Computing....Pages 222-232
A Comparative Usability Evaluation of Traditional Password Managers....Pages 233-251
An Adversarial Evaluation of Network Signaling and Control Mechanisms....Pages 252-265
Secure Personalized Recommendation System for Mobile User....Pages 266-277
Protecting White-Box AES with Dual Ciphers....Pages 278-291
$\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels....Pages 292-310
On Equivalence Classes of Boolean Functions....Pages 311-324
Public Discussion Must Be Back and Forth in Secure Message Transmission....Pages 325-337
Scalar Product-Based Distributed Oblivious Transfer....Pages 338-354
Unconditionally Secure Rational Secret Sharing in Standard Communication Networks....Pages 355-369
Oblivious Transfer with Complex Attribute-Based Access Control....Pages 370-395
Fault Attacks on the Montgomery Powering Ladder....Pages 396-406
First Principal Components Analysis: A New Side Channel Distinguisher....Pages 407-419
Fault Analysis on Stream Cipher MUGI....Pages 420-434
Back Matter....Pages -
备用描述
3642242081,9783642242083
Springer 2011
开源日期
2012-02-14
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。