This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007.
The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.
Author(s): Willi Geiselmann, Rainer Steinwandt (auth.), Kil-Hyun Nam, Gwangsoo Rhee (eds.)
Series: Lecture Notes in Computer Science 4817 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 370
Tags: Data Encryption; Discrete Mathematics in Computer Science; Systems and Data Security; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks
Front Matter....Pages -
Cryptanalysis of a Hash Function Proposed at ICISC 2006....Pages 1-10
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006....Pages 11-26
A Cryptanalysis of the Double-Round Quadratic Cryptosystem....Pages 27-36
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment....Pages 37-48
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments....Pages 49-63
Handling Dynamic Information Release....Pages 64-76
Improving the Time Complexity of Matsui’s Linear Cryptanalysis....Pages 77-88
On Large Distributions for Linear Cryptanalysis....Pages 89-101
Passive Attacks on a Class of Authentication Protocols for RFID....Pages 102-115
Side Channel Attacks on Irregularly Decimated Generators....Pages 116-130
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module....Pages 131-143
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences....Pages 144-155
A Secure Virtual Execution Environment for Untrusted Code....Pages 156-167
Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum....Pages 168-179
Improving Upon the TET Mode of Operation....Pages 180-192
New Local Collisions for the SHA-2 Hash Family....Pages 193-205
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL....Pages 206-226
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4....Pages 227-238
New Results on Impossible Differential Cryptanalysis of Reduced AES....Pages 239-250
A Note About the Traceability Properties of Linear Codes....Pages 251-258
Power Analysis Attacks on MDPL and DRSL Implementations....Pages 259-272
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier....Pages 273-281
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA....Pages 282-296
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon’s Algorithm....Pages 297-308
Analysis of Multivariate Hash Functions....Pages 309-323
Colliding Message Pair for 53-Step HAS-160....Pages 324-334
Weaknesses in the HAS-V Compression Function....Pages 335-345
Security-Preserving Asymmetric Protocol Encapsulation....Pages 346-366
Back Matter....Pages -