[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-031-17510-7guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Innovative Security Solutions for Information Technology and Communications: 14th International Conference, SecITC 2021, Virtual Event, November 25–26, 2021, Revised Selected Papers
2021 Proceeding
  • Editors:
  • Peter Y.A. Ryan,
  • Cristian Toma
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
International Conference on Information Technology and Communications Security25 November 2021
ISBN:
978-3-031-17509-1
Published:
25 November 2021

Reflects downloads up to 21 Jan 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
front-matter
Front Matter
Pages i–x
back-matter
Back Matter
Article
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch
Abstract

During a computer security investigation, a security analyst has to explore the logs available to understand what happened in the compromised system. For such tasks, visual analysis tools have been developed to help with log exploration. They ...

Article
ADAM: Automatic Detection of Android Malware
Abstract

The popularity of the Android operating system has been rising ever since its initial release in 2008. This is due to two major reasons. The first is that Android is open-source, due to which a lot of mobile manufacturing companies use some form ...

Article
Attack on the Common Prime Version of Murru and Saettone’s RSA Cryptosystem
Abstract

In this paper, we study the security bounds of d for the Common Prime version of Murru and Saettone’s RSA cyptosystem. We show that this variant of RSA can be broken if d<N32-α2+ϵ, where α=logNe, and ϵ is a small constant. By using Jochemsz and ...

Article
Identification of Data Breaches from Public Forums
Abstract

Adversaries initiate their cyberattacks towards different entities such as healthcare or business institutes, and a successful attack causes data breaches. They publish their success stories in public forums for ranking purposes. The victim ...

Article
A Forensic Framework for Webmail Threat Detection Using Log Analysis
Abstract

Today, webmail is being used in a number of organizations for all kinds of important communications as they move to cloud-based services. Several cyber threats involving phishing, malicious insider, unauthorized access to data and ransomware ...

Article
An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic Permutations
Abstract

Permutation-based symmetric cryptography has become increasingly popular over the past ten years, especially in the lightweight domain. More than half of the 32 second-round candidates of NIST’s lightweight cryptography standardization project are ...

Article
Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers
Abstract

The enormous growth of the Internet of Things (IoT) in the recent past has fueled a strong demand for lightweight implementations of cryptosystems, i.e. implementations that are efficient enough to run on resource-limited devices like sensor ...

Article
Limitations of the Use of Neural Networks in Black Box Cryptanalysis
Abstract

In this work, we first abstract a block cipher to a set of parallel Boolean functions. Then, we establish the conditions that allow a multilayer perceptron (MLP) neural network to correctly emulate a Boolean function. We extend these conditions to ...

Article
Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU Prime
Abstract

This paper introduces a new polynomial multiplication algorithm which decreases the arithmetic complexity and another modified algorithm that speeds up the implementation run-time over the characteristic three fields. We first introduce a new ...

Article
An Optimization of Bleichenbacher’s Oracle Padding Attack
Abstract

In the present paper we propose an improvement of Bleichenbacher’s Oracle Padding Attack that makes breaking more restrictive implementations of the PKCS#1 v1.5 standard feasible both theoretically and in practice. It is proven that the current ...

Article
UC Analysis of the Randomized McEliece Cryptosystem
Abstract

In this paper, we will examine the UC (Universal Composability) security of an improved version of the McEliece cryptosystem, namely the Randomized McEliece cryptosystem. We will prove that even this improved variant does not realize FPKE, the ...

Article
Using Five Cards to Encode Each Integer in Z/6Z
Abstract

Research in secure multi-party computation using a deck of playing cards, often called card-based cryptography, dates back to 1989 when Den Boer introduced the “five-card trick” to compute the logical AND function. Since then, many protocols to ...

Article
Conditional Differential Cryptanalysis on Bagua
Abstract

At ASIACRYPT 2010, Knellwolf et al. proposed conditional differential cryptanalysis (CDC) on NFSR-based cryptosystems, and applied this technique to analyze the security of the eSTREAM finalist Grain v1. Bagua is a hardware-oriented stream cipher ...

Article
Perfect Anonymous Authentication and Secure Communication in Internet-of-Things
Abstract

The ever-expanding Internet-of-Things (IoT) does not only call for data security but also privacy. On the other hand, conventional secure communication protocols only consider confidentiality and integrity of data, where the anonymity of ...

Article
Flexible Group Non-interactive Key Exchange in the Standard Model
Abstract

In this paper, we constructed a non-interactive group key exchange protocol (GNIKE) with flexibility, i.e., the number of participants in the GNIKE is not predefined. Moreover, our GNIKE construction is only based on multilinear map and ...

Article
A Multifunctional Modular Implementation of Grover’s Algorithm
Abstract

Information security plays a major role in the dynamics of today’s interconnected world. Despite the successful implementation and effectiveness of modern cryptographic techniques, their inherent limitations can be exploited by quantum computers. ...

Article
Lightweight Swarm Authentication
Abstract

In this paper we describe a provably secure authentication protocol for resource limited devices. The proposed algorithm performs whole-network authentication using very few rounds and in a time logarithmic in the number of nodes. Compared to one-...

Article
New Configurations of Grain Ciphers: Security Against Slide Attacks
Abstract

eSTREAM brought to the attention of the cryptographic community a number of stream ciphers including Grain v0 and its revised version Grain v1. The latter was selected as a finalist of the competition’s hardware-based portfolio. The Grain family ...

Article
Improved Security Solutions for DDoS Mitigation in 5G Multi-access Edge Computing
Abstract

Multi-access Edge Computing (MEC) is a 5G-enabling solution that aims to bring cloud-computing capabilities closer to the end-users. This paper focuses on mitigation techniques against Distributed Denial-of-Service (DDoS) attacks in the context of ...

Article
Long-Term Secure Asymmetric Group Key Agreement
Abstract

A group key agreement protocol allows a set of users to share a common secret in presence of adversaries. In symmetric group key agreement protocol, the set of users will have a secret key at the end of protocol while in an asymmetric group key ...

Article
Building Deobfuscated Applications from Polymorphic Binaries
Abstract

Along with the rise of the cyber threats industry, attackers have become more fluent in developing and integrating various obfuscation layers. This is mainly focused on impeding or at least slowing the analysis and the reverse engineering process, ...

Article
Viruses, Exploits, Malware and Security Issues on IoT Devices
Abstract

The necessity of using secure Internet-of-Things (IoT) devices in various use cases has increased over years. According with various analysis in the first half of the year 2021, there were 1.5 billion attacks on smart devices for stealing data, ...

Contributors
  • University of Luxembourg
  • Bucharest University of Economic Studies
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations