Progress in Cryptology - INDOCRYPT 2005: 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology in India, INDOCRYPT 2005, held in Bangalore, India in December 2005.

The 31 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on sequences, boolean function and S-box, hash functions, design principles, cryptanalysis, time memory trade-off, new constructions, pairings, signatures, applications, e-cash, and implementations.

Author(s): V. Kumar Murty (auth.), Subhamoy Maitra, C. E. Veni Madhavan, Ramarathnam Venkatesan (eds.)
Series: Lecture Notes in Computer Science 3797 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 420
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Operating Systems; Computer Communication Networks; Management of Computing and Information Systems

Front Matter....Pages -
Abelian Varieties and Cryptography....Pages 1-12
Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences....Pages 13-22
Period of Streamcipher Edon80 ....Pages 23-34
On the Algebraic Immunity of Symmetric Boolean Functions....Pages 35-48
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks....Pages 49-62
How to Construct Universal One-Way Hash Functions of Order r ....Pages 63-76
Towards Optimal Double-Length Hash Functions....Pages 77-89
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries....Pages 90-103
Design Principles for Combiners with Memory....Pages 104-117
Cryptanalysis of the Quadratic Generator....Pages 118-129
Attack the Dragon....Pages 130-142
Two Algebraic Attacks Against the F-FCSRs Using the IV Mode....Pages 143-154
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks....Pages 155-168
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY....Pages 169-182
Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints....Pages 183-196
Cryptanalysis of Barni et al. Watermarking Scheme....Pages 197-208
Completion Attacks and Weak Keys of Oleshchuk’s Public Key Cryptosystem....Pages 209-220
An Optimal Subset Cover for Broadcast Encryption....Pages 221-231
MaTRU: A New NTRU-Based Cryptosystem....Pages 232-243
Anonymous Password-Based Authenticated Key Exchange....Pages 244-257
Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism....Pages 258-269
Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme....Pages 270-282
Short Undeniable Signatures Without Random Oracles: The Missing Link....Pages 283-296
Short Threshold Signature Schemes Without Random Oracles....Pages 297-310
Attacking an Asynchronous Multi-party Contract Signing Protocol....Pages 311-321
Fairness and Correctness in Case of a Premature Abort....Pages 322-331
Short E-Cash....Pages 332-346
A Universally Composable Scheme for Electronic Cash....Pages 347-360
Energy-Privacy Trade-Offs in VLSI Computations....Pages 361-374
Modified Serial Multipliers for Type-IV Gaussian Normal Bases....Pages 375-388
Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic....Pages 389-402
SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2....Pages 403-416
Back Matter....Pages -