LEADER 04231nam 2200589 450 001 9910484083503321 005 20211008162252.0 010 $a3-540-73458-9 024 7 $a10.1007/978-3-540-73458-1 035 $a(CKB)1000000000490678 035 $a(SSID)ssj0000318277 035 $a(PQKBManifestationID)11283550 035 $a(PQKBTitleCode)TC0000318277 035 $a(PQKBWorkID)10310321 035 $a(PQKB)11047590 035 $a(DE-He213)978-3-540-73458-1 035 $a(MiAaPQ)EBC3061535 035 $a(MiAaPQ)EBC6511674 035 $a(Au-PeEL)EBL6511674 035 $a(OCoLC)191469965 035 $a(PPN)123728282 035 $a(EXLCZ)991000000000490678 100 $a20211008d2007 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aInformation security and privacy $e12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings /$fJosef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.) 205 $a1st ed. 2007. 210 1$aBerlin, Germany ;$aNew York, New York :$cSpringer,$d[2007] 210 4$dİ2007 215 $a1 online resource (XIV, 476 p.) 225 1 $aSecurity and Cryptology ;$v4586 300 $aIncludes index. 311 $a3-540-73457-0 320 $aIncludes bibliographical references and index. 327 $aStream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks -- Strengthening NLS Against Crossword Puzzle Attack -- Hashing -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT-Hashing Function -- Second Preimages for Iterated Hash Functions and Their Implications on MACs -- On Building Hash Functions from Multivariate Quadratic Equations -- Biometrics -- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication -- Soft Generation of Secure Biometric Keys -- Secret Sharing -- Flaws in Some Secret Sharing Schemes Against Cheating -- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters -- Cryptanalysis -- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 -- Analysis of the SMS4 Block Cipher -- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme -- Public Key Cryptography -- : A Hardware-Oriented Trapdoor Cipher -- Anonymity on Paillier?s Trap-Door Permutation -- Generic Certificateless Key Encapsulation Mechanism -- Double-Size Bipartite Modular Multiplication -- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography -- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM -- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards -- Authentication -- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication -- Certificateless Signature Revisited -- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures -- Hash-and-Sign with Weak Hashing Made Secure -- ?Sandwich? Is Indeed Secure: How to Authenticate a Message with Just One Hashing -- Threshold Anonymous Group Identification and Zero-Knowledge Proof -- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions -- E-Commerce -- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users -- Efficient and Secure Comparison for On-Line Auctions -- Practical Compact E-Cash -- Security -- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks -- On Proactive Perfectly Secure Message Transmission. 410 0$aSecurity and Cryptology ;$v4586 606 $aComputer security$vCongresses 615 0$aComputer security 676 $a005.8 702 $aGhodosi$b Hossein 702 $aDawson$b Ed 702 $aPieprzyk$b Josef$f1949- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484083503321 996 $aInformation Security and Privacy$92569701 997 $aUNINA