05079nam 22008295 450 99646629690331620200703030426.01-280-38765-397866135655703-642-14081-510.1007/978-3-642-14081-5(CKB)2670000000045029(SSID)ssj0000446546(PQKBManifestationID)11291494(PQKBTitleCode)TC0000446546(PQKBWorkID)10496707(PQKB)11567197(DE-He213)978-3-642-14081-5(MiAaPQ)EBC3065919(PPN)149024649(EXLCZ)99267000000004502920100924d2010 u| 0engurnn|008mamaatxtccrInformation Security and Privacy[electronic resource] 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, Proceedings /edited by Ron Steinfeld, Philip Hawkes1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (XII, 403 p. 40 illus.) Security and Cryptology ;6168Bibliographic Level Mode of Issuance: Monograph3-642-14080-7 Includes bibliographical references and index.Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.Security and Cryptology ;6168Computer securityData encryption (Computer science)Computer communication systemsManagement information systemsComputer scienceAlgorithmsComputer science—MathematicsSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Sydney <2010>swdComputer security.Data encryption (Computer science).Computer communication systems.Management information systems.Computer science.Algorithms.Computer science—Mathematics.Systems and Data Security.Cryptology.Computer Communication Networks.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.Discrete Mathematics in Computer Science.005.8Steinfeld Ronedthttp://id.loc.gov/vocabulary/relators/edtHawkes Philipedthttp://id.loc.gov/vocabulary/relators/edtACISP 2010BOOK996466296903316Information Security and Privacy772014UNISA