Topics in Cryptology – CT-RSA 2005: The Cryptographers’ Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2005, CT-RSA 2005, held in San Francisco, CA, USA in February 2005.

The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on cryptanalysis, public key encryption, signature schemes, design principles, password-based protocols, pairings, and efficient and secure implementations.

Author(s): Cynthia Dwork (auth.), Alfred Menezes (eds.)
Series: Lecture Notes in Computer Science 3376 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 390
Tags: Data Encryption; Discrete Mathematics in Computer Science; Operating Systems; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks

Front Matter....Pages -
Sub-linear Queries Statistical Databases: Privacy with Power....Pages 1-6
Malicious Cryptography: Kleptographic Aspects....Pages 7-18
Resistance of SNOW 2.0 Against Algebraic Attacks....Pages 19-28
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes....Pages 29-43
Hold Your Sessions: An Attack on Java Session-Id Generation....Pages 44-57
Update on SHA-1....Pages 58-71
A Fast Correlation Attack on the Shrinking Generator....Pages 72-86
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption....Pages 87-103
A Generic Conversion with Optimal Redundancy....Pages 104-117
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 ....Pages 118-135
Foundations of Group Signatures: The Case of Dynamic Groups....Pages 136-153
Time-Selective Convertible Undeniable Signatures....Pages 154-171
On Tolerant Cryptographic Constructions....Pages 172-190
Simple Password-Based Encrypted Key Exchange Protocols....Pages 191-208
Hard Bits of the Discrete Log with Applications to Password Authentication....Pages 209-226
Proofs for Two-Server Password Authentication....Pages 227-244
Design and Analysis of Password-Based Key Derivation Functions....Pages 245-261
A New Two-Party Identity-Based Authenticated Key Agreement....Pages 262-274
Accumulators from Bilinear Pairings and Applications....Pages 275-292
Computing the Tate Pairing....Pages 293-304
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings....Pages 305-322
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box....Pages 323-333
CryptoGraphics: Secret Key Cryptography Using Graphics Cards....Pages 334-350
Side-Channel Leakage of Masked CMOS Gates....Pages 351-365
New Minimal Weight Representations for Left-to-Right Window Methods....Pages 366-383
Back Matter....Pages -