Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/autre/information-security-and-cryptology/wu/descriptif_2909675
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=2909675

Information Security and Cryptology, 2012 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers Security and Cryptology Series

Langue : Anglais

Coordonnateurs : Wu Chuan-Kun, Yung Moti, Lin Dongdai

Couverture de l’ouvrage Information Security and Cryptology
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.

Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems.- Cryptanalysis vs. Provable Security.- Boosting Scalability in Anomaly-Based Packed Executable Filtering.- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs.- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming.- Adleman-Manders-Miller Root Extraction Method Revisited.- Multi-pixel Encryption Visual Cryptography.- An Improved Electronic Voting Scheme without a Trusted Random Number Generator.- Fault Attacks against the Miller Algorithm in Hessian Coordinates.- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion.- Improved Tradeoff between Encapsulation and Decapsulation of HK09.- Non-interactive Deniable Authentication Protocols.- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3.- Efficient Self-certified Signatures with Batch Verification.- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves.- Weak-Key Class of MISTY1 for Related-Key Differential Attack.- Cryptanalysis of Reduced-Round KLEIN Block Cipher.- An Efficient RSA Implementation without Precomputation.- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures.- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation.- Towards Attack Resilient Social Network Based Threshold Signing.- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.

Up to date results

Fast track conference proceedings

State of the art research

Date de parution :

Ouvrage de 396 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

Prix indicatif 52,74 €

Ajouter au panier