Advances in information and computer security : 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings / Keisuke Tanaka, Yuji Suga (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 9241. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham : Springer, 2015Description: 1 online resource (xiii, 357 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783319224251
- 3319224255
- 3319224247
- 9783319224244
- IWSEC 2015
- Computer security -- Congresses
- Data encryption (Computer science) -- Congresses
- Sécurité informatique -- Congrès
- Chiffrement (Informatique) -- Congrès
- Data encryption
- Discrete mathematics
- Algorithms & data structures
- Network hardware
- Computer security
- Computers -- Security -- General
- Computers -- Data Processing
- Computers -- Programming -- Algorithms
- Computers -- Hardware -- Network Hardware
- Computer security
- Data encryption (Computer science)
- computerwetenschappen
- computer sciences
- wiskunde
- mathematics
- algoritmen
- algorithms
- computeranalyse
- computer analysis
- gegevensbeheer
- data management
- computernetwerken
- computer networks
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8 23
- QA76.9.A25
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
International conference proceedings.
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed August 24, 2015).
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware.
English.
Intro; Preface; IWSEC 2015 10th International Workshop on Security; Contents; Identity-Based Encryption; Identity-Based Lossy Encryption from Learning with Errors; 1 Introduction; 1.1 Background; 1.2 Our Contributions; 1.3 Related Work; 1.4 Organization; 2 Preliminaries; 2.1 Notations; 2.2 Min-Entropy; 2.3 Learning with Errors; 2.4 Discrete Gaussians; 2.5 Lossy Encryption; 2.6 Some Results About Randomness; 3 Identity-Based Lossy Encryption; 3.1 Selective Opening Security; 3.2 Construction from LWE; 4 Conclusion; References; Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
1 Introduction2 Preliminaries; 3 Revocable Hierarchical Identity-Based Encryption; 4 Proposed Adaptive-ID Secure RHIBE; 5 Conclusion; References; Elliptic Curve Cryptography; Invalid Curve Attacks in a GLS Setting; 1 Introduction; 2 Preliminaries; 3 Invalid Curve Attack on GLS Scalar Multiplication; 4 Complexity Analysis; 5 Implementations; 6 Conclusion; A Computation of (u) on u [1, 3]; References; New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates; 1 Introduction; 2 Preliminary; 3 Speeding up Some Elliptic Curve Operations in Affine Coordinates; 4 Comparisons
4.1 Point Operations4.2 Scalar Multiplications; 5 Conclusions; References; Factoring; Implicit Factorization of RSA Moduli Revisited (Short Paper); 1 Introduction; 2 Preliminaries; 3 Previous Method of Factoring Two RSA Moduli with Implicitly Common Middle Bits; 4 Our Improvement; 5 Conclusion; References; Symmetric Cryptanalysis; Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions; 1 Introduction; 2 The Hash Function Family; 3 Improved Preimage Attacks on Reduced-Round GOST
3.1 Overview of the Preimage Attack on 5-Round GOST-2563.2 Phase 1. Construct the Multicollisions; 3.3 Phase 2. Invert the Output Transformation; 3.4 Phase 3. Generate the Preimage; 3.5 Summarize the 5-Round Attack; 3.6 Extend the Preimage Attack to More Rounds; 4 Conclusion and Open Problems; References; Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s; 1 Introduction; 2 MILP Based Framework for Automatic Differential Cryptanalysis; 3 Techniques for Obtaining Better Characteristics
4 Application to DESL and LBlock-s4.1 Improved Single-Key and Related-Key Differential Characteristics for DESL; 4.2 Tighter Security Bound for LBlock-s; 5 Conclusion and Discussion; References; Provable Security; NM-CPA Secure Encryption with Proofs of Plaintext Knowledge; 1 Introduction; 2 Preliminaries; 2.1 Public Key Encryption; 2.2 Proofs of Knowledge; 3 Our Scheme; 4 Security Proof; 5 Applications: Electronic Voting; 5.1 Election Schemes; 5.2 Sufficient Conditions for Ballot Secrecy; 5.3 Towards a Secure Variant of Helios; 6 Related Work; 7 Conclusion; A Proof of Theorem 1