LEADER 05048nam 22008295 450 001 996465661203316 005 20230412073501.0 010 $a3-642-34704-5 024 7 $a10.1007/978-3-642-34704-7 035 $a(CKB)3280000000002221 035 $a(SSID)ssj0000788964 035 $a(PQKBManifestationID)11407332 035 $a(PQKBTitleCode)TC0000788964 035 $a(PQKBWorkID)10723529 035 $a(PQKB)11175137 035 $a(DE-He213)978-3-642-34704-7 035 $a(MiAaPQ)EBC3070190 035 $a(PPN)168327406 035 $a(EXLCZ)993280000000002221 100 $a20121026d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Cryptology$b[electronic resource] $e7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers /$fedited by Chuan-Kun Wu, Moti Yung, Dongdai Lin 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (X, 396 p. 56 illus.) 225 1 $aSecurity and Cryptology ;$v7537 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-34703-7 327 $aAdaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems -- Cryptanalysis vs. Provable Security -- Boosting Scalability in Anomaly-Based Packed Executable Filtering -- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs -- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming -- Adleman-Manders-Miller Root Extraction Method Revisited -- Multi-pixel Encryption Visual Cryptography -- An Improved Electronic Voting Scheme without a Trusted Random Number Generator -- Fault Attacks against the Miller Algorithm in Hessian Coordinates -- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion -- Improved Tradeoff between Encapsulation and Decapsulation of HK09 -- Non-interactive Deniable Authentication Protocols -- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3 -- Efficient Self-certified Signatures with Batch Verification -- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening -- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves -- Weak-Key Class of MISTY1 for Related-Key Differential Attack -- Cryptanalysis of Reduced-Round KLEIN Block Cipher -- An Efficient RSA Implementation without Precomputation -- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures -- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation -- Towards Attack Resilient Social Network Based Threshold Signing -- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings -- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications. 410 0$aSecurity and Cryptology ;$v7537 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aAlgorithms 606 $aInformation technology?Management 606 $aElectronic commerce 606 $aData and Information Security 606 $aCryptology 606 $aCoding and Information Theory 606 $aAlgorithms 606 $aComputer Application in Administrative Data Processing 606 $ae-Commerce and e-Business 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aAlgorithms. 615 0$aInformation technology?Management. 615 0$aElectronic commerce. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aCoding and Information Theory. 615 24$aAlgorithms. 615 24$aComputer Application in Administrative Data Processing. 615 24$ae-Commerce and e-Business. 676 $a005.8 702 $aWu$b Chuan-Kun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLin$b Dongdai$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInscrypt (Conference) 906 $aBOOK 912 $a996465661203316 996 $aInformation Security and Cryptology$9772230 997 $aUNISA