Skip to main content
  • Conference proceedings
  • © 2013

Security Engineering and Intelligence Informatics

CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Conference proceedings info: CD-ARES 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. Modern Cryptography

    1. Symmetric-Key Cryptography

    2. Public-Key Cryptography

      1. Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics
        • Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
        Pages 55-74
    3. Algorithmic Cryptanalysis

      1. Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method
        • Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann
        Pages 91-104
      2. On the Security of LBlock against the Cube Attack and Side Channel Cube Attack
        • Saad Islam, Mehreen Afzal, Adnan Rashdi
        Pages 105-121
  3. Security Engineering

    1. Software and Hardware Implementation of Cryptographic Algorithms

      1. Code-Based Identification and Signature Schemes in Software
        • Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann
        Pages 122-136
      2. Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine
        • Danilo Câmara, Conrado P. L. Gouvêa, Julio López, Ricardo Dahab
        Pages 137-154
    2. Database Encryption

      1. Cumulus4j: A Provably Secure Database Abstraction Layer
        • Matthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber
        Pages 180-193
    3. Interaction between Cryptographic Theory and Implementation Issues

      1. Optimal Parameters for XMSS<sup><i>MT</i></sup>
        • Andreas Hülsing, Lea Rausch, Johannes Buchmann
        Pages 194-208
      2. Solving the Discrete Logarithm Problem for Packing Candidate Preferences
        • James Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia
        Pages 209-221
      3. SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences
        • Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen
        Pages 222-235
    4. Cyber Security and Dependability

      1. Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace
        • Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione
        Pages 236-252
      2. Analyzing the Internet Stability in Presence of Disasters
        • Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo De Santis
        Pages 253-268
      3. Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project
        • Thomas Schaberreiter, Sébastien Varrette, Pascal Bouvry, Juha Röning, Djamel Khadraoui
        Pages 269-287

Other Volumes

  1. Security Engineering and Intelligence Informatics

About this book

This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.

Editors and Affiliations

  • ICAR-CNR, University of Calabria, Rende Cosenza, Italy

    Alfredo Cuzzocrea

  • Evolaris Next Level, Graz, Austria

    Christian Kittl

  • SBA Research, Vienna, Austria

    Dimitris E. Simos

  • SBA Research, Institute of Software Technology and Interactive Systems, Vienna University of Technology, Wien, Austria

    Edgar Weippl

  • Information Technology and Decision Sciences, Old Dominion University, Norfolk, USA

    Lida Xu

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access