Table of Contents
|
2nd International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, LidaXu (Eds.)
|
Front Matter |
Modern Cryptography
|
Symmetric-Key Cryptography
|
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock Jiageng Chen, Atsuko Miyaji |
1-15 |
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions Asato Kubai, Junji Shikata, Yohei Watanabe |
16-28 |
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography Kishan Gupta, Indranil Ray |
29-43 |
Public-Key Cryptography
|
Code-Based Public-Key Encryption Resistant to Key Leakage Edoardo Persichetti |
44-54 |
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba |
55-74 |
Algorithmic Cryptanalysis
|
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images Abdel Kamal, Roger Zahno, Amr Youssef |
75-90 |
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann |
91-104 |
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack Saad Islam, Mehreen Afzal, Adnan Rashdi |
105-121 |
Security Engineering
|
Software and Hardware Implementation of Cryptographic Algorithms
|
Code-Based Identification and Signature Schemes in Software Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, and Gerhard Hoffmann |
122-136 |
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine Danilo Câmara, Conrado Gouvêa, Julio López, Ricardo Dahab |
137-154 |
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves Gerwin Gsenger, Christian Hanser |
155-167 |
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves Christian Hanser, Christian Wagner |
168-179 |
Database Encryption
|
Cumulus4j: A Provably Secure Database Abstraction Layer Matthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber |
180-193 |
Interaction between Cryptographic Theory and Implementation Issues
|
Optimal Parameters for XMSSMT Andreas Hülsing, Lea Rausch, Johannes Buchmann |
194-208 |
Solving the Discrete Logarithm Problem for Packing Candidate Preferences James Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia |
209-221 |
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen |
222-235 |
3rd International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013)
|
Cyber Security and Dependability
|
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace Clara Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione |
236-252 |
Analyzing the Internet Stability in Presence of Disasters Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo Santis |
253-268 |
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project Thomas Schaberreiter, Sébastien Varrette, Pascal Bouvry, Juha Röning, Djamel Khadraoui |
269-287 |
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function Wolfgang Boehmer |
288-304 |
Using Probabilistic Analysis for the Certification of Machine Control Systems Atif Mashkoor, Osman Hasan, Wolfgang Beer |
305-320 |
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms Suliman Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad Moorsel |
321-336 |
Network Security and Privacy
|
A Multiple-Key Management Scheme in Wireless Sensor Networks William Chu, Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang |
337-344 |
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment Igor Kotenko, Evgenia Novikova |
345-360 |
A Denial of Service Attack to GSM Networks via Attach Procedure Nicola Gobbo, Alessio Merlo, Mauro Migliardi |
361-376 |
PPM: Privacy Policy Manager for Personalized Services Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake |
377-392 |
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks Bo Liu, Baokang Zhao, Bo Liu, Chunqing Wu |
393-407 |
Multimedia Technology for Homeland Defense
|
Intelligent UBMSS Systems for Strategic Information Management Lidia Ogiela, Marek Ogiela |
408-413 |
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness Arcangelo Castiglione, Ciriaco D’ambrosio, Alfredo Santis, Francesco Palmieri |
414-429 |
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense Tomasz Hachaj, Marek Ogiela |
430-441 |
Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios Francesco Flammini, Stefano Marrone, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini |
442-456 |
A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process Vaise Patu, Shuichiro Yamamoto |
457-464 |