Information Security and Cryptology: 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revise by Chuan-Kun WuInformation Security and Cryptology: 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revise by Chuan-Kun Wu

Information Security and Cryptology: 7th International Conference, Inscrypt 2011, Beijing, China…

byChuan-Kun WuEditorMoti Yung, Dongdai Lin

Paperback | October 16, 2012

Pricing and Purchase Info

$93.15 online 
$103.50 list price save 10%
Earn 466 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.
Title:Information Security and Cryptology: 7th International Conference, Inscrypt 2011, Beijing, China…Format:PaperbackDimensions:396 pages, 23.5 × 15.5 × 0.02 inPublished:October 16, 2012Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3642347037

ISBN - 13:9783642347030

Reviews

Table of Contents

Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems.- Cryptanalysis vs. Provable Security.- Boosting Scalability in Anomaly-Based Packed Executable Filtering.- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs.- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming.- Adleman-Manders-Miller Root Extraction Method Revisited.- Multi-pixel Encryption Visual Cryptography.- An Improved Electronic Voting Scheme without a Trusted Random Number Generator.- Fault Attacks against the Miller Algorithm in Hessian Coordinates.- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion.- Improved Tradeoff between Encapsulation and Decapsulation of HK09.- Non-interactive Deniable Authentication Protocols.- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3.- Efficient Self-certified Signatures with Batch Verification.- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves.- Weak-Key Class of MISTY1 for Related-Key Differential Attack.- Cryptanalysis of Reduced-Round KLEIN Block Cipher.- An Efficient RSA Implementation without Precomputation.- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures.- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation.- Towards Attack Resilient Social Network Based Threshold Signing.- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.