This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008.
The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.
Author(s): Deike Priemuth-Schmid, Alex Biryukov (auth.), Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das (eds.)
Series: Lecture Notes in Computer Science 5365 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008
Language: English
Pages: 437
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Systems and Data Security; Computer Communication Networks; Management of Computing and Information Systems
Front Matter....Pages -
Slid Pairs in Salsa20 and Trivium....Pages 1-14
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers....Pages 15-26
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin....Pages 27-39
New Results on the Key Scheduling Algorithm of RC4....Pages 40-52
Two Attacks on RadioGatún....Pages 53-66
Faster Multicollisions....Pages 67-77
A New Type of 2-Block Collisions in MD5....Pages 78-90
New Collision Attacks against Up to 24-Step SHA-2....Pages 91-103
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model....Pages 104-115
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low....Pages 116-129
Type-Based Proxy Re-encryption and Its Construction....Pages 130-144
Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures....Pages 145-157
Concrete Security for Entity Recognition: The Jane Doe Protocol....Pages 158-171
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)....Pages 172-184
Round Efficient Unconditionally Secure Multiparty Computation Protocol....Pages 185-199
A New Anonymous Password-Based Authenticated Key Exchange Protocol....Pages 200-212
Group Key Management: From a Non-hierarchical to a Hierarchical Structure....Pages 213-225
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures....Pages 226-238
Floating Fault Analysis of Trivium....Pages 239-250
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection....Pages 251-265
New Related-Key Boomerang Attacks on AES....Pages 266-278
New Impossible Differential Attacks on AES....Pages 279-293
Reflection Cryptanalysis of Some Ciphers....Pages 294-307
A Differential-Linear Attack on 12-Round Serpent....Pages 308-321
New AES Software Speed Records....Pages 322-336
A New Class of Weak Encryption Exponents in RSA....Pages 337-349
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC....Pages 350-362
Chai-Tea, Cryptographic Hardware Implementations of xTEA....Pages 363-375
High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms....Pages 376-388
More Discriminants with the Brezing-Weng Method....Pages 389-399
Another Approach to Pairing Computation in Edwards Coordinates....Pages 400-413
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem....Pages 414-425
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority....Pages 426-436
Back Matter....Pages -