Atjaunināt sīkdatņu piekrišanu

Information Security and Cryptology: 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers 2014 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 408 pages, height x width: 235x155 mm, weight: 646 g, 51 Illustrations, black and white; XIII, 408 p. 51 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 8567
  • Izdošanas datums: 30-Oct-2014
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319120867
  • ISBN-13: 9783319120867
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 408 pages, height x width: 235x155 mm, weight: 646 g, 51 Illustrations, black and white; XIII, 408 p. 51 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 8567
  • Izdošanas datums: 30-Oct-2014
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319120867
  • ISBN-13: 9783319120867
Citas grāmatas par šo tēmu:
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013.The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security.

Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research"s Journal of Cryptology.
Boolean Function and Block Cipher
A Note on Semi-bent and Hyper-bent Boolean Functions
3(19)
Chunming Tang
Yu Lou
Yanfeng Qi
Maozhi Xu
Baoan Guo
New Construction of Differentially 4-Uniform Bijections
22(17)
Claude Carlet
Deng Tang
Xiaohu Tang
Qunying Liao
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks
39(16)
Siwei Sun
Lei Hu
Ling Song
Yonghong Xie
Peng Wang
Sequence and Stream Cipher
On the Key-Stream Periods Probability of Edon80
55(15)
Yunqing Xu
Cube Theory and Stable k-Error Linear Complexity for Periodic Sequences
70(16)
Jianqin Zhou
Wanquan Liu
Guanglu Zhou
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Zpq
86(15)
Xinxin Gong
Bin Zhang
Dengguo Feng
Tongjiang Yan
Applications: Systems and Theory
Automatic Detection and Analysis of Encrypted Messages in Malware
101(17)
Ruoxu Zhao
Dawu Gu
Juanru Li
Yuanyuan Zhang
EAdroid: Providing Environment Adaptive Security for Android System
118(14)
Hongliang Liang
Yu Dong
Bin Wang
Shuchang Liu
Supervised Usage of Signature Creation Devices
132(18)
Przemyslaw Kubiak
Miroslaw Kutylowski
A Practical Attack on Patched MIFARE Classic
150(17)
Yi-Hao Chiu
Wei-Chih Hong
Li-Ping Chou
Jintai Ding
Bo-Yin Yang
Chen-Mou Cheng
Computational Number Theory
Omega Pairing on Hyperelliptic Curves
167(18)
Shan Chen
Kunpeng Wang
Dongdai Lin
Tao Wang
Pairing Computation on Edwards Curves with High-Degree Twists
185(16)
Liangze Li
Hongfeng Wu
Fan Zhang
The Gallant-Lambert-Vanstone Decomposition Revisited
201(16)
Zhi Hu
Maozhi Xu
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors
217(22)
Zhe Liu
Johann Grobschadl
Duncan S. Wong
Public Key Cryptography
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement
239(16)
Lei Zhang
Qianhong Wu
Josep Domingo-Ferrer
Bo Qin
Sherman S.M. Chow
Wenchang Shi
Security Model and Analysis of FHMQV, Revisited
255(15)
Shengli Liu
Kouichi Sakurai
Man Weng
Fangguo Zhang
Yunlei Zhao
RSA-OAEP Is RKA Secure
270(12)
Dingding Jia
Bao Li
Xianhui Lu
Yamin Liu
A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme
282(9)
Zhengjun Cao
Frederic Lafitte
Olivier Markowitch
Hash Function
LHash: A Lightweight Hash Function
291(18)
Wenling Wu
Shuang Wu
Lei Zhang
Jian Zou
Le Dong
Cryptanalysis of the Round-Reduced GOST Hash Function
309(16)
Jian Zou
Wenling Wu
Shuang Wu
Side-Channel and Leakage
Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces
325(18)
Suvadeep Hajra
Debdeep Mukhopadhyay
Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm
343(18)
Mingjie Liu
Jiazhe Chen
Hexin Li
Application and System Security
Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions
361(16)
Kai Chen
Dongdai Lin
Li Yan
Xin Sun
One-Time Programs with Limited Memory
377(18)
Konrad Durnoga
Stefan Dziembowski
Tomasz Kazana
Michal Zajac
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks
395(12)
Xiaoqian Li
Peng Wang
Bao Li
Zhelei Sun
Author Index 407