Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2186783guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
WISA'11: Proceedings of the 12th international conference on Information Security Applications
2011 Proceeding
  • Editors:
  • Souhwan Jung,
  • Moti Yung
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
Jeju Island Korea August 22 - 24, 2011
ISBN:
978-3-642-27889-1
Published:
22 August 2011
Sponsors:
KCC, MOPAS

Reflects downloads up to 16 Nov 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Practical attacks on a cryptosystem proposed in patent WO/2009/066313

A new cryptosystem is proposed in the international patent WO/2009/066313 by Artus. The symmetric-key primitive in the cryptosystem resembles a stream cipher. The system differs markedly from cryptosystems used today in that the secret key is changed ...

Article
Generalized security analysis of the random key bits leakage attack

In CRYPTO 2009, Heninger and Shacham presented a new method of recovering RSA private keys bit by bit given a fraction of private data, and analyzed resistance of RSA against the attack. They obtained a system of relations between RSA private variables ...

Article
Improved integral attacks on reduced-round CLEFIA block cipher

In this paper a new 9-round integral distinguisher of CLEFIA is proposed based on byte-pattern, which is proved in detail. Then by using the partial sum technique we improve the previous result on 11-round CLEFIA and proposed integral attack on 12-, 13- ...

Article
Preimage attacks on Full-ARIRANG: analysis of DM-Mode with middle feed-forward

In this paper, we present preimage attacks on hash function ARIRANG, which is one of the first round candidates in the SHA-3 competition. Although ARIRANG was not chosen for the second round, the vulnerability as a hash function has not been discovered ...

Article
Known-Key distinguisher on round-reduced 3d block cipher

3D block cipher is an AES-based block cipher which has a three-dimensional state. Besides some traditional attacks, Knudsen and Rijmen introduced a new tool, known-key distinguisher, to identify the weak pseudo-randomness of a block cipher. In this ...

Article
Identity-Based signcryption from identity-based cryptography

A signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain ...

Article
Order-Preserving encryption for non-uniformly distributed plaintexts

Order-preserving encryption (OPE) is a deterministic encryption scheme whose encryption function preserves numerical ordering of the plaintexts. While the concept of OPE was introduced in 2004, the first provably-secure OPE scheme was constructed by ...

Article
Solving a DLP with auxiliary input with the ρ-algorithm

The discrete logarithm problem with auxiliary input (DLPwAI) is a problem to find a positive integer α from elements G, αG, αdG in an additive cyclic group generated by G of prime order r and a positive integer d dividing r ---1. In 2011, Sakemi et al. ...

Article
A general NTRU-Like framework for constructing lattice-based public-key cryptosystems

As we know, one of the most difficult points of constructing a new public-key cryptosystem is to hide its trapdoor. By studying how NTRU hides its trapdoor, we present a general NTRU-like framework. The framework reduces constructing new lattice-based ...

Article
A peer-to-peer content-distribution scheme resilient to key leakage

We consider a problem of key leakage in peer-to-peer (P2P) content distribution. In content-distribution services, content is encrypted so that only legitimate users can access the content. Users (peers) cannot be fully trusted in a P2P network because ...

Article
Rule indexing for efficient intrusion detection systems

As the use of the Internet has increased tremendously, the network traffic involved in malicious activities has also grown significantly. To detect and classify such malicious activities, Snort, the open-sourced network intrusion detection system, is ...

Article
Security data extraction from IEC 61850 ACSI models for network and system management

The international standard IEC 62351 proposed the format of abstract data object for secure smart grid controls which is named as Network and System Management (NSM). It is devised to respond not only deliberate attacks such as cyber hacking and ...

Article
Lightweight middleware-based zigbee security in building energy management system

Sensor networks have effects on various fields as usage of these increases. Building Energy Management System is one of the representative examples. Moreover, a variety of researches are added to the BEMS, and ZigBee is one of them. Various ...

Article
A map-layer-based access control model

Access control is very important for database management systems. Although several access control models have been proposed for geographical maps, most of them are based on the concept of authorization window. If there are many complex authorizations, ...

Article
Application authentication for hybrid services of broadcasting and communications networks

Broadcasting and communications networks can be used together to offer hybrid broadcasting services that incorporate a variety of personalized information from communications networks in TV programs. To enable these services, many different applications ...

Article
Accelerating multiparty computation by efficient random number bitwise-sharing protocols

It is becoming more and more important to make use of personal or classified information while keeping it confidential. A promising tool for meeting this challenge is multiparty computation (MPC), which enables multiple parties, each given a snippet of ...

Article
Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks

Key establishment is a fundamental service for secure communications between a central device and each biosensor implanted in the human body. It provides and manages the cryptographic keys to enable security services such as confidentiality, integrity ...

Article
Mutual private set intersection with linear complexity

A private set intersection (PSI) protocol allows players to obtain the intersection of their inputs. While in its unilateral version only the client can obtain the intersection, the mutual PSI protocol enables all players to get the desired result. In ...

Article
Advanced path selection method for detection of false reports in statistical filtering based WSNs

Sensor nodes communicate with each other via wireless channels, which are not particularly secure. Accordingly, sensor nodes are vulnerable to physical attacks, potentially compromising the node's keys. An adversary can capture deployed nodes and inject ...

Article
Evaluating the security and privacy of near field communication --- case: public transportation

Public transportation has been the killer application of Radio Frequency Identification (RFID) technology in recent years. However, RFID-based Near Field Communication (NFC) is gaining the advantage by challenging RFID technology in its own environment. ...

Article
Exploiting routing tree construction in CTP

Sensor nodes in a Wireless Sensor Network (WSN) are scattered in an environment to collect data. These nodes are limited in resources and cannot process the collected data or store it for long periods of time. Thus, the sensor nodes rely on routing ...

Contributors
  • Soongsil University
  • Columbia University

Index Terms

  1. Proceedings of the 12th international conference on Information Security Applications
    Index terms have been assigned to the content through auto-classification.
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations