IFIP TC6 Open Digital Library

CD-ARES Workshops 2013: Regensburg, Germany

Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings

Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu, Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu

Springer, Lecture Notes in Computer Science 8128, ISBN: 978-3-642-40587-7



Contents

Modern Cryptography

Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock.

Jiageng Chen, Atsuko Miyaji

 1-15

Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.

Asato Kubai, Junji Shikata, Yohei Watanabe

 16-28

On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography.

Kishan Chand Gupta, Indranil Ghosh Ray

 29-43

Code-Based Public-Key Encryption Resistant to Key Leakage.

Edoardo Persichetti

 44-54

Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.

Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba

 55-74

A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images.

Abdel Alim Kamal, Roger Zahno, Amr M. Youssef

 75-90

Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method.

Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann

 91-104

On the Security of LBlock against the Cube Attack and Side Channel Cube Attack.

Saad Islam, Mehreen Afzal, Adnan Rashdi

 105-121

Security Engineering

Code-Based Identification and Signature Schemes in Software.

Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann

 122-136

Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine.

Danilo F. Câmara, Conrado Porto Lopes Gouvêa, Julio López, Ricardo Dahab

 137-154

Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves.

Gerwin Gsenger, Christian Hanser

 155-167

Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves.

Christian Hanser, Christian Wagner

 168-179

Cumulus4j: A Provably Secure Database Abstraction Layer.

Matthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber

 180-193

Optimal Parameters for XMSS MT.

Andreas Hülsing, Lea Rausch, Johannes Buchmann

 194-208

Solving the Discrete Logarithm Problem for Packing Candidate Preferences.

James Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia

 209-221

SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences.

Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen

 222-235

Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace.

Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione

 236-252

Analyzing the Internet Stability in Presence of Disasters.

Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo De Santis

 253-268

Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project.

Thomas Schaberreiter, Sébastien Varrette, Pascal Bouvry, Juha Röning, Djamel Khadraoui

 269-287

How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function.

Wolfgang Boehmer

 288-304

Using Probabilistic Analysis for the Certification of Machine Control Systems.

Atif Mashkoor, Osman Hasan, Wolfgang Beer

 305-320

Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms.

Suliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel

 321-336

A Multiple-Key Management Scheme in Wireless Sensor Networks.

Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu

 337-344

VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment.

Igor Kotenko, Evgenia Novikova

 345-360

A Denial of Service Attack to GSM Networks via Attach Procedure.

Nicola Gobbo, Alessio Merlo, Mauro Migliardi

 361-376

PPM: Privacy Policy Manager for Personalized Services.

Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake

 377-392

An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks.

Bo Liu, Baokang Zhao, Bo Liu, Chunqing Wu

 393-407

Intelligent UBMSS Systems for Strategic Information Management.

Lidia Ogiela, Marek R. Ogiela

 408-413

Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness.

Arcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, Francesco Palmieri

 414-429

Computer Karate Trainer in Tasks of Personal and Homeland Security Defense.

Tomasz Hachaj, Marek R. Ogiela

 430-441

Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios.

Francesco Flammini, Stefano Marrone, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini

 442-456

A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process.

Vaise Patu, Shuichiro Yamamoto

 457-464