TY - BOOK AU - Lee,Donghoon AU - Hong,Seokhie ED - ICISC (Conference) TI - Information, Security and Cryptology--ICISC 2009: 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers T2 - Lecture notes in computer science SN - 9783642144233 AV - QA76.9.A25 I85 2010 U1 - 005.8/2 22 PY - 2010/// CY - Berlin, New York PB - Springer-Verlag KW - Data encryption (Computer science) KW - Congresses KW - Data protection KW - Computer security KW - Computer networks KW - Security measures KW - Computer Communication Networks KW - Computer Security KW - Chiffrement (Informatique) KW - Congrès KW - Protection de l'information (Informatique) KW - Sécurité informatique KW - Réseaux d'ordinateurs KW - Sécurité KW - Mesures KW - Informatique KW - eclas KW - fast KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - Includes bibliographical references and index; Key Management and Key Exchange -- Generic One Round Group Key Exchange in the Standard Model -- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange -- Efficient Certificateless KEM in the Standard Model -- Public Key Cryptography -- Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing -- Factoring Unbalanced Moduli with Known Bits -- Algebraic Cryptanalysis and Stream Cipher -- Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared -- MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals -- Improved Linear Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree Computations -- Lightweight Cryptography and RFID: Tackling the Hidden Overheads -- Side Channel Attack -- Power Analysis of Single-Rail Storage Elements as Used in MDPL -- A Timing Attack against Patterson Algorithm in the McEliece PKC -- Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications -- Privacy Enhanced Technology -- First CPIR Protocol with Data-Dependent Computation -- Efficient Fuzzy Matching and Intersection on Private Datasets -- Efficient Privacy-Preserving Face Recognition -- Cryptographic Protocol -- Linear, Constant-Rounds Bit-Decomposition -- Attacking and Repairing the Improved ModOnions Protocol -- Secret Handshakes with Revocation Support -- Cryptanalysis of Hash Function -- Practical Rebound Attack on 12-Round Cheetah-256 -- Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash -- Improved Preimage Attack for 68-Step HAS-160 -- Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1 -- Network Security -- Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson -- Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth N2 - Annotation; This book constitutes the proceedings of the 12th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2009 UR - https://link.springer.com/10.1007/978-3-642-14423-3 ER -