No abstract available.
Proceeding Downloads
Practical attacks on a cryptosystem proposed in patent WO/2009/066313
A new cryptosystem is proposed in the international patent WO/2009/066313 by Artus. The symmetric-key primitive in the cryptosystem resembles a stream cipher. The system differs markedly from cryptosystems used today in that the secret key is changed ...
Generalized security analysis of the random key bits leakage attack
In CRYPTO 2009, Heninger and Shacham presented a new method of recovering RSA private keys bit by bit given a fraction of private data, and analyzed resistance of RSA against the attack. They obtained a system of relations between RSA private variables ...
Improved integral attacks on reduced-round CLEFIA block cipher
In this paper a new 9-round integral distinguisher of CLEFIA is proposed based on byte-pattern, which is proved in detail. Then by using the partial sum technique we improve the previous result on 11-round CLEFIA and proposed integral attack on 12-, 13- ...
Preimage attacks on Full-ARIRANG: analysis of DM-Mode with middle feed-forward
In this paper, we present preimage attacks on hash function ARIRANG, which is one of the first round candidates in the SHA-3 competition. Although ARIRANG was not chosen for the second round, the vulnerability as a hash function has not been discovered ...
Known-Key distinguisher on round-reduced 3d block cipher
3D block cipher is an AES-based block cipher which has a three-dimensional state. Besides some traditional attacks, Knudsen and Rijmen introduced a new tool, known-key distinguisher, to identify the weak pseudo-randomness of a block cipher. In this ...
Identity-Based signcryption from identity-based cryptography
A signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain ...
Order-Preserving encryption for non-uniformly distributed plaintexts
Order-preserving encryption (OPE) is a deterministic encryption scheme whose encryption function preserves numerical ordering of the plaintexts. While the concept of OPE was introduced in 2004, the first provably-secure OPE scheme was constructed by ...
Solving a DLP with auxiliary input with the ρ-algorithm
The discrete logarithm problem with auxiliary input (DLPwAI) is a problem to find a positive integer α from elements G, αG, αdG in an additive cyclic group generated by G of prime order r and a positive integer d dividing r ---1. In 2011, Sakemi et al. ...
A general NTRU-Like framework for constructing lattice-based public-key cryptosystems
As we know, one of the most difficult points of constructing a new public-key cryptosystem is to hide its trapdoor. By studying how NTRU hides its trapdoor, we present a general NTRU-like framework. The framework reduces constructing new lattice-based ...
A peer-to-peer content-distribution scheme resilient to key leakage
We consider a problem of key leakage in peer-to-peer (P2P) content distribution. In content-distribution services, content is encrypted so that only legitimate users can access the content. Users (peers) cannot be fully trusted in a P2P network because ...
Rule indexing for efficient intrusion detection systems
As the use of the Internet has increased tremendously, the network traffic involved in malicious activities has also grown significantly. To detect and classify such malicious activities, Snort, the open-sourced network intrusion detection system, is ...
Security data extraction from IEC 61850 ACSI models for network and system management
The international standard IEC 62351 proposed the format of abstract data object for secure smart grid controls which is named as Network and System Management (NSM). It is devised to respond not only deliberate attacks such as cyber hacking and ...
Lightweight middleware-based zigbee security in building energy management system
Sensor networks have effects on various fields as usage of these increases. Building Energy Management System is one of the representative examples. Moreover, a variety of researches are added to the BEMS, and ZigBee is one of them. Various ...
A map-layer-based access control model
Access control is very important for database management systems. Although several access control models have been proposed for geographical maps, most of them are based on the concept of authorization window. If there are many complex authorizations, ...
Application authentication for hybrid services of broadcasting and communications networks
Broadcasting and communications networks can be used together to offer hybrid broadcasting services that incorporate a variety of personalized information from communications networks in TV programs. To enable these services, many different applications ...
Accelerating multiparty computation by efficient random number bitwise-sharing protocols
It is becoming more and more important to make use of personal or classified information while keeping it confidential. A promising tool for meeting this challenge is multiparty computation (MPC), which enables multiple parties, each given a snippet of ...
Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks
Key establishment is a fundamental service for secure communications between a central device and each biosensor implanted in the human body. It provides and manages the cryptographic keys to enable security services such as confidentiality, integrity ...
Mutual private set intersection with linear complexity
A private set intersection (PSI) protocol allows players to obtain the intersection of their inputs. While in its unilateral version only the client can obtain the intersection, the mutual PSI protocol enables all players to get the desired result. In ...
Advanced path selection method for detection of false reports in statistical filtering based WSNs
Sensor nodes communicate with each other via wireless channels, which are not particularly secure. Accordingly, sensor nodes are vulnerable to physical attacks, potentially compromising the node's keys. An adversary can capture deployed nodes and inject ...
Evaluating the security and privacy of near field communication --- case: public transportation
Public transportation has been the killer application of Radio Frequency Identification (RFID) technology in recent years. However, RFID-based Near Field Communication (NFC) is gaining the advantage by challenging RFID technology in its own environment. ...
Exploiting routing tree construction in CTP
Sensor nodes in a Wireless Sensor Network (WSN) are scattered in an environment to collect data. These nodes are limited in resources and cannot process the collected data or store it for long periods of time. Thus, the sensor nodes rely on routing ...
Index Terms
- Proceedings of the 12th international conference on Information Security Applications