This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.
The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.
Author(s): Johannes Buchmann, Richard Lindner (auth.), Bimal Roy, Nicolas Sendrier (eds.)
Series: Lecture Notes in Computer Science 5922 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009
Language: English
Pages: 443
City: Berlin ; New York
Tags: Data Encryption; Data Structures, Cryptology and Information Theory; Systems and Data Security; Computer Communication Networks; Coding and Information Theory; Mathematical Logic and Formal Languages
Front Matter....Pages -
Secure Parameters for SWIFFT....Pages 1-17
FSBday....Pages 18-38
Reusing Static Keys in Key Agreement Protocols....Pages 39-56
A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols....Pages 57-71
Fault Analysis of Rabbit: Toward a Secret Key Leakage....Pages 72-87
On Physical Obfuscation of Cryptographic Algorithms....Pages 88-103
Cache Timing Attacks on Clefia....Pages 104-118
Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode....Pages 119-135
On the Symmetric Negabent Boolean Functions....Pages 136-143
Improved Meet-in-the-Middle Attacks on AES....Pages 144-156
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode....Pages 157-168
Second Preimage Attack on SHAMATA-512....Pages 169-181
Towards Secure and Practical MACs for Body Sensor Networks....Pages 182-198
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions....Pages 199-218
A Distinguisher for the Compression Function of SIMD-512....Pages 219-232
Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree....Pages 233-247
Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller....Pages 248-262
A New Hard-Core Predicate of Paillier’s Trapdoor Function....Pages 263-271
Private Interrogation of Devices via Identification Codes....Pages 272-289
RFID Distance Bounding Multistate Enhancement....Pages 290-307
Two Attacks against the F f RFID Protocol....Pages 308-320
Efficient Constructions of Signcryption Schemes and Signcryption Composability....Pages 321-342
On Generic Constructions of Designated Confirmer Signatures....Pages 343-362
Verifiably Encrypted Signatures from RSA without NIZKs....Pages 363-377
Identity Based Aggregate Signcryption Schemes....Pages 378-397
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience....Pages 398-417
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems....Pages 418-429
Oblivious Multi-variate Polynomial Evaluation....Pages 430-442
Back Matter....Pages -