Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

From the reviews:

"This book contains selected refereed proceedings of the tenth Institute of Mathematics and its Applications (IMA) international conference. … The book covers some important research areas in coding and cryptography. … I think anyone who wants to study or design a system for crypto-protecting sensitive data will find useful information in this book. … Books such as this are vital to ensuring the progress of theoretical and practical studies on cryptography, one of the most important technologies in the field of computer and network security." (Patriciu Victor-Valeriu, Computing Reviews, August, 2006)

Author(s): Ueli Maurer (auth.), Nigel P. Smart (eds.)
Series: Lecture Notes in Computer Science 3796 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 468
Tags: Data Encryption; Coding and Information Theory; Discrete Mathematics in Computer Science; Computer Communication Networks

Front Matter....Pages -
Abstract Models of Computation in Cryptography....Pages 1-12
Pairing-Based Cryptography at High Security Levels....Pages 13-36
Improved Decoding of Interleaved AG Codes....Pages 37-46
Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics....Pages 47-58
A Trellis-Based Bound on (2,1)-Separating Codes....Pages 59-67
Tessellation Based Multiple Description Coding....Pages 68-77
Exploiting Coding Theory for Collision Attacks on SHA-1....Pages 78-95
Hash Based Digital Signature Schemes....Pages 96-115
A General Construction for Simultaneous Signing and Encrypting....Pages 116-135
Non-interactive Designated Verifier Proofs and Undeniable Signatures....Pages 136-154
Partial Key Recovery Attacks on XCBC, TMAC and OMAC....Pages 155-167
Domain Expansion of MACs: Alternative Uses of the FIL-MAC....Pages 168-185
Normality of Vectorial Functions....Pages 186-200
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128....Pages 201-219
The Physically Observable Security of Signature Schemes....Pages 220-232
On the Automatic Construction of Indistinguishable Operations....Pages 233-247
Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods....Pages 248-261
Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem....Pages 262-277
An Algebraic Framework for Cipher Embeddings....Pages 278-289
Probabilistic Algebraic Attacks....Pages 290-303
Unconditionally Secure Information Authentication in Presence of Erasures....Pages 304-321
Generalized Strong Extractors and Deterministic Privacy Amplification....Pages 322-339
On Threshold Self-healing Key Distribution Schemes....Pages 340-354
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator....Pages 355-375
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited....Pages 376-391
Pairings on Elliptic Curves over Finite Commutative Rings....Pages 392-409
A Key Encapsulation Mechanism for NTRU....Pages 410-427
Efficient Identity-Based Key Encapsulation to Multiple Parties....Pages 428-441
Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme....Pages 442-459
Back Matter....Pages -