Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings

Author:   Goichiro Hanaoka ,  Toshihiro Yamauchi
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Volume:   7631
ISBN:  

9783642341168


Pages:   261
Publication Date:   20 September 2012
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $190.08 Quantity:  
Add to Cart

Share |

Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Goichiro Hanaoka ,  Toshihiro Yamauchi
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Volume:   7631
Dimensions:   Width: 15.50cm , Height: 1.40cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642341168


ISBN 10:   3642341160
Pages:   261
Publication Date:   20 September 2012
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Model-Based Conformance Testing for Android.- Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.- Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU.- Very Short Critical Path Implementation of AES with Direct Logic Gates.- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary.- Compact Stateful Encryption Schemes with Ciphertext Verifiability.- Structured Encryption for Conceptual Graphs.- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability.- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI.- Boomerang Distinguishers for Full HAS-160 Compression Function.- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function.- Annihilators of Fast Discrete Fourier Spectra Attacks.- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher.- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security.- Efficient Secure Primitive for Privacy Preserving Distributed Computations.- Generic Construction of GUC Secure Commitment in the KRK Model.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List