Eintrag weiter verarbeiten
Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
Gespeichert in:
Personen und Körperschaften: | , |
---|---|
Titel: | Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings/ edited by Ron Steinfeld, Philip Hawkes |
Format: | E-Book Konferenzbericht |
Sprache: | Englisch |
veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2010
|
Gesamtaufnahme: |
SpringerLink Lecture notes in computer science ; 6168 |
Schlagwörter: | |
Buchausg. u.d.T.: | Information security and privacy, Berlin : Springer, 2010, XII, 402 S. |
Quelle: | Verbunddaten SWB |
Zugangsinformationen: | Elektronischer Volltext - Campuslizenz |
Zusammenfassung: | Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. |
---|---|
Umfang: | Online-Ressource (XII, 403p. 40 illus, digital) |
ISBN: |
9783642140815
|
DOI: | 10.1007/978-3-642-14081-5 |