This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India in December 2003.
The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on stream ciphers, block ciphers, Boolean functions, secret sharing, bilinear pairings, public key cryptography, signature schemes, protocols, elliptic curve cryptography and algebraic geometry, implementation and digital watermarking, and authentication.
Author(s): Harald Niederreiter (auth.), Thomas Johansson, Subhamoy Maitra (eds.)
Series: Lecture Notes in Computer Science 2904
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 436
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems
Front Matter....Pages -
Linear Complexity and Related Complexity Measures for Sequences....Pages 1-17
Forensic Computing....Pages 18-35
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation....Pages 36-51
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator....Pages 52-67
Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA....Pages 68-81
Impossible Differential Cryptanalysis for Block Cipher Structures....Pages 82-96
Impossible Differential Attack on 30-Round SHACAL-2....Pages 97-106
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria....Pages 107-120
Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria....Pages 121-134
On Multiplicative Linear Secret Sharing Schemes....Pages 135-147
A New (2, n )-Visual Threshold Scheme for Color Images....Pages 148-161
On the Power of Computational Secret Sharing....Pages 162-176
Identity-Based Broadcasting....Pages 177-190
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings....Pages 191-204
Extending Joux’s Protocol to Multi Party Key Agreement....Pages 205-217
Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups....Pages 218-227
Prime Numbers of Diffie-Hellman Groups for IKE-MODP....Pages 228-234
Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems....Pages 235-251
Security Analysis of Several Group Signature Schemes....Pages 252-265
Forking Lemmas for Ring Signature Schemes....Pages 266-279
Practical Mental Poker Without a TTP Based on Homomorphic Encryption....Pages 280-294
Lightweight Mobile Credit-Card Payment Protocol....Pages 295-308
On the Construction of Prime Order Elliptic Curves....Pages 309-322
Counting Points on an Abelian Variety over a Finite Field....Pages 323-333
Side Channel Attack on Ha-Moon’s Countermeasure of Randomized Signed Scalar Multiplication....Pages 334-348
Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF ( p m )....Pages 349-362
Cryptanalysis of Block Based Spatial Domain Watermarking Schemes....Pages 363-374
More Efficient Password Authenticated Key Exchange Based on RSA....Pages 375-387
A Password-Based Authenticator: Security Proof and Applications....Pages 388-401
Stronger Security Bounds for OMAC, TMAC, and XCBC....Pages 402-415
Progressive Verification: The Case of Message Authentication....Pages 416-429
Back Matter....Pages -