|
|
|
Integral Cryptanalysis of ARIA |
|
|
1 | (14) |
|
|
|
|
Cryptanalysis of the ESSENCE Family of Hash Functions |
|
|
15 | (20) |
|
|
|
|
|
|
|
|
Differential-Multiple Linear Cryptanalysis |
|
|
35 | (15) |
|
|
|
|
|
Differential Attack on Five Rounds of the SC2000 Block Cipher |
|
|
50 | (10) |
|
|
Signature and Signcryption |
|
|
|
Pairing-Based Nominative Signatures with Selective and Universal Convertibility |
|
|
60 | (15) |
|
|
|
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing |
|
|
75 | (18) |
|
|
|
|
Sanitizable Signatures with Strong Transparency in the Standard Model |
|
|
93 | (15) |
|
|
|
|
|
Breaking and Building of Threshold Signcryption Schemes |
|
|
108 | (16) |
|
|
|
|
|
|
|
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption |
|
|
124 | (10) |
|
|
|
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network |
|
|
134 | (10) |
|
|
|
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework |
|
|
144 | (10) |
|
|
|
|
|
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication |
|
|
154 | (10) |
|
|
|
Optionally Identifiable Private Handshakes |
|
|
164 | (15) |
|
|
|
|
|
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience |
|
|
179 | (19) |
|
|
|
|
Cipher Design and Analysis |
|
|
|
Gemstone: A New Stream Cipher Using Coupled Map Lattice |
|
|
198 | (17) |
|
|
|
|
|
|
Proposition of Two Cipher Structures |
|
|
215 | (15) |
|
|
|
|
Hardware Framework for the Rabbit Stream Cipher |
|
|
230 | (18) |
|
|
Linearity within the SMS4 Block Cipher |
|
|
248 | (18) |
|
|
|
|
|
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages |
|
|
266 | (12) |
|
|
|
|
|
Weak Keys in RSA with Primes Sharing Least Significant Bits |
|
|
278 | (10) |
|
|
|
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption |
|
|
288 | (15) |
|
|
|
Constructing Better KEMs with Partial Message Recovery |
|
|
303 | (10) |
|
|
|
Network and System Security |
|
|
|
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms |
|
|
313 | (11) |
|
|
|
|
Remodeling Vulnerability Information |
|
|
324 | (13) |
|
|
|
|
|
Using Strategy Objectives for Network Security Analysis |
|
|
337 | (13) |
|
|
|
|
|
A DAA Scheme Requiring Less TPM Resources |
|
|
350 | (16) |
|
|
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags |
|
|
366 | (17) |
|
|
Weaknesses in Two Recent Lightweight RFID Authentication Protocols |
|
|
383 | (10) |
|
|
Julio C. Hernandez-Castro |
|
|
|
|
|
Algebraic Side-Channel Attacks |
|
|
393 | (18) |
|
|
Francois-Xavier Standaert |
|
|
|
|
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing |
|
|
411 | (15) |
|
|
|
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents |
|
|
426 | (17) |
|
|
|
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints |
|
|
443 | (16) |
|
|
Author Index |
|
459 | |