1. Trang chủ
  2. » Thể loại khác

Information security and cryptology ICISC 2014

800 788 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Free ebooks ==> www.Ebook777.com LNCS 8949 Jooyoung Lee Jongsung Kim (Eds.) Information Security and CryptologyICISC 2014 17th International Conference Seoul, Korea, December 3–5, 2014 Revised Selected Papers 123 www.Ebook777.com Free ebooks ==> www.Ebook777.com Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zürich, Switzerland John C Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany www.Ebook777.com 8949 More information about this series at http://www.springer.com/series/7410 Jooyoung Lee Jongsung Kim (Eds.) • Information Security and CryptologyICISC 2014 17th International Conference Seoul, Korea, December 3–5, 2014 Revised Selected Papers 123 Free ebooks ==> www.Ebook777.com Editors Jooyoung Lee Sejong University Seoul Korea Jongsung Kim Kookmin University Seoul Korea ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-319-15942-3 ISBN 978-3-319-15943-0 (eBook) DOI 10.1007/978-3-319-15943-0 Library of Congress Control Number: 2015933494 LNCS Sublibrary: SL4 – Security and Cryptology Springer Cham Heidelberg New York Dordrecht London © Springer International Publishing Switzerland 2015 This work is subject to copyright All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed The use of general descriptive names, registered names, trademarks, service marks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made Printed on acid-free paper Springer International Publishing AG Switzerland is part of Springer Science+Business Media (www.springer.com) www.Ebook777.com Preface ICISC 2014, the 17th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 3–5, 2014 This year the conference was hosted by the KIISC (Korea Institute of Information Security and Cryptology) jointly with the NSRI (National Security Research Institute) The aim of this conference is to provide the international forum with the latest results of research, development, and applications in the field of information security and cryptology The conference received 91 submissions from more than 20 countries and were able to accept 26 papers from 11 countries, with an acceptance rate of 28.6% The review and selection processes were carried out by the Program Committee (PC) members, 79 prominent experts worldwide First, each paper was blind reviewed by at least three PC members Second, to resolve conflicts in the reviewer’s decisions, the individual review reports were open to all PC members, and detailed interactive discussions on each paper ensued For the LNCS post-proceedings, the authors of selected papers had a few weeks to prepare their final versions based on the comments received from the reviewers We also recommended that authors should revise their papers based on the comments and recommendations they might receive from attendees upon their presentations at the conference We would like to thank all authors who have submitted their papers to ICISC 2014 and all PC members It was a truly nice experience to work with such talented and hardworking researchers We also appreciate the external reviewers for assisting the PC members in their particular areas of expertise Finally, we would like to thank all attendees for their active participation and the organizing members who nicely managed this conference We look forward to see you again in ICISC 2015 December 2014 Jooyoung Lee Jongsung Kim Organization General Chairs Heekuck Oh Kwang Ho Kim Hanyang University, Korea National Security Research Institute, Korea Organizing Committee Chair Young-Ho Park Sejong Cyber University, Korea Committee Members Heuisu Ryu Junbeom Hur Daesung Kwon Dooho Choi Gyeongin National University of Education, Korea Chung-Ang University, Korea National Security Research Institute, Korea Electronics and Telecommunications Research Institute, Korea Korea Information Security Agency, Korea Pusan National University, Korea Kookmin University, Korea Sungkyunkwan University, Korea Kongju National University, Korea Jin-Soo Lim Howon Kim Okyeon Yi Soonhak Kwon Hyobeom Ahn Program Committee Co-chairs Jooyoung Lee Jongsung Kim Sejong University, Korea Kookmin University, Korea Committee Members Joonsang Baek Yoo-Jin Baek Andrey Bogdanov Zhenfu Cao Yongwha Chung Paolo D’Arco Rafael Dowsley Khalifa University, United Arab Emirates Woosuk University, Korea Technical University of Denmark, Denmark Shanghai Jiao Tong University, China Korea University, Korea Università degli Studi di Salerno, Italy Karlsruhe Institute of Technology, Germany VIII Organization Johann Großschädl Dong-Guk Han Martin Hell Swee-Huay Heng Jiankun Hu Jung Yeon Hwang Eul Gyu Im David Jao Dong Kyue Kim Howon Kim Huy Kang Kim Jihye Kim So Jeong Kim Shinsaku Kiyomoto Jin Kwak Taekyoung Kwon Hyang-Sook Lee Jonghyup Lee Moon Sung Lee Mun-Kyu Lee Pil Joong Lee Dongdai Lin Hua-Yi Lin Sjouke Mauw Florian Mendel Atsuko Miyaji Yutaka Miyake Aziz Mohaisen DaeHun Nyang Heekuck Oh Katsuyuki Okeya Rolf Oppliger Raphael C.-W Phan Christian Rechberger Bimal Roy Kouichi Sakurai Nitesh Saxena Dongkyoo Shin Sang-Uk Shin Rainer Steinwandt University of Luxembourg, Luxembourg Kookmin University, Korea Lund University, Sweden Multimedia University, Malaysia University of New South Wales Canberra, Australia Electronics and Telecommunications Research Institute, Korea Hanyang University, Korea University of Waterloo, Canada Hanyang University, Korea Pusan National University, Korea Korea University, Korea Kookmin University, Korea The Attached Institute of ETRI, Korea KDDI R&D Laboratories, Japan Soonchunhyang University, Korea Yonsei University, Korea Ewha Womans University, Korea Korea National University of Transportation, Korea Seoul National University, Korea Inha University, Korea Pohang University of Science and Technology, Korea Institute of Information Engineering, Chinese Academy of Sciences, China China University of Technology, Taiwan University of Luxembourg, Luxembourg Graz University of Technology, Austria Japan Advanced Institute of Science and Technology, Japan KDDI R&D Laboratories, Japan Verisign Labs, USA Inha University, Korea Hanyang University, Korea Hitachi, Japan eSECURITY Technologies, Switzerland Multimedia University, Malaysia DTU Matematik, Denmark Indian Statistical Institute, India Kyushu University, Japan University of Alabama at Birmingham, USA Sejong University, Korea Pukyong National University, Korea Florida Atlantic University, USA Organization Hung-Min Sun Willy Susilo Tsuyoshi Takagi Jorge Villar Hongxia Wang Yongzhuang Wei Wenling Wu Toshihiro Yamauchi Wei-Chuen Yau Ching-Hung Yeh Sung-Ming Yen Kazuki Yoneyama Myungkeun Yoon Dae Hyun Yum Aaram Yun Fangguo Zhang Changhoon Lee Taeshik Shon Sang-Soo Yeo Jiqiang Lu Hongjun Wu Elena Andreeva Lejla Batina Donghoon Chang Mridul Nandi Souradyuti Paul Hyung Tae Lee Blazy Olivier Seokhie Hong Marion Videau National Tsing Hua University, Taiwan University of Wollongong, Australia Kyushu University, Japan Universitat Politècnica de Catalunya, Spain Southwest Jiaotong University, China Guilin University of Electronic Technology, China Institute of Software, Chinese Academy of Sciences, China Okayama University, Japan Multimedia University, Malaysia Far East University, Taiwan National Central University, Taiwan Nippon Telegraph and Telephone Corporation, Japan Kookmin University, Korea Myongji University, Korea Ulsan National Institute of Science and Technology, Korea Sun Yat-sen University, China Seoul National University of Science and Technology, Korea Ajou University, Korea Mokwon University, Korea Institute for Infocomm Research (I2R), Singapore Nanyang University, Singapore Katholieke Universiteit Leuven, Belgium Radboud University Nijmegen, The Netherlands IIIT-Delhi, India Indian Statistical Institute, India University of Waterloo, Canada and IITGandhinagar, India Nanyang Technological University, Singapore Ruhr University Bochum, Germany Korea University, Korea Université de Lorraine, France IX Free ebooks ==> www.Ebook777.com Contents RSA Security General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA Atsushi Takayasu and Noboru Kunihiro On the Security of Distributed Multiprime RSA Ivan Damgård, Gert Læssøe Mikkelsen, and Tue Skeltved 18 Digital Signature Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs Kazuki Yoneyama Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme Wenbin Zhang and Chik How Tan 37 53 Public Key Cryptography Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree Yasuyuki Nogami and Hwajeong Seo Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, and Keisuke Tanaka A Fast Phase-based Enumeration Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors Dan Ding, Guizhen Zhu, Yang Yu, and Zhongxiang Zheng 69 84 101 Block Ciphers How Much Can Complexity of Linear Cryptanalysis Be Reduced? Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, and Masakatu Morii Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers Jung-Keun Lee, Bonwook Koo, Dongyoung Roh, Woo-Hwan Kim, and Daesung Kwon www.Ebook777.com 117 132 ... www.Ebook777.com 8949 More information about this series at http://www.springer.com/series/7410 Jooyoung Lee Jongsung Kim (Eds.) • Information Security and Cryptology – ICISC 2014 17th International... Publishing AG Switzerland is part of Springer Science+Business Media (www.springer.com) www.Ebook777.com Preface ICISC 2014, the 17th International Conference on Information Security and Cryptology, was... laws and regulations and therefore free for general use The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate

Ngày đăng: 12/03/2018, 10:40

Xem thêm:

TỪ KHÓA LIÊN QUAN

Mục lục

    General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA

    2.2 Howgrave-Graham's Lemma

    3 Previous Lattice Constructions to Solve SIP

    4 New Lattice Constructions to Solve SIP

    5 On the Security of Multi-Prime RSA

    On the Security of Distributed Multiprime RSA

    3 Protocol for Two Players with a Three-Prime Modulus

    3.3 Passive Security of the Protocol

    4.1 Security of Four-Prime Distributed RSA

    4.2 Efficiency of Four-Prime Distributed RSA

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN