The field of Cryptology witnessed a revolution in the late seventies. Since then it has been expanded into an important and exciting area of research. Over the last two decades, India neither participated actively nor did it contribute sig nificantly towards the development in this field. However, recently a number of active research groups engaged in important research and developmental work have crystalized in different parts of India. As a result, their interaction with the international crypto community has become necessary. With this backdrop, it was proposed that a conference on cryptology - INDOCRYPT, be organized for the first time in India. The Indian Statistical Institute was instrumental in hosting this conference. INDOCRYPT has generated a large amount of enthu siasm amongst the Indians as well as the International crypto communities. An INDOCRYPT steering committee has been formed and the committee has plans to make INDOCRYPT an annual event. For INDOCRYPT 2000, the program committee considered a total of 54 pa pers and out of these 25 were selected for presentation. The conference program also included two invited lectures by Prof. Adi Shamir and Prof. Eli Biham. These proceedings include the revised versions of the 25 papers accepted by the program committee. These papers were selected from all the submissions based on originality, quality and relevance to the field of Cryptology. Revisions were not checked and the authors bear the full responsibility for the contents of the papers in these proceedings.
Author(s): Dingyi Pei, Wenliang Qin (auth.), Bimal Roy, Eiji Okamoto (eds.)
Series: Lecture Notes in Computer Science 1977
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2000
Language: English
Pages: 302
Tags: Data Encryption; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Operating Systems
The Correlation of a Boolean Function with Its Variables....Pages 1-8
On Choice of Connection-Polynomials for LFSR-Based Stream Ciphers....Pages 9-18
On Resilient Boolean Functions with Maximal Possible Nonlinearity....Pages 19-30
Decimation Attack of Stream Ciphers....Pages 31-42
Cryptanalysis of the A5/1 GSM Stream Cipher....Pages 43-51
On Bias Estimation in Linear Cryptanalysis....Pages 52-66
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks....Pages 67-79
Improved Impossible Differentials on Twofish....Pages 80-92
An Online, Transferable E-Cash Payment System....Pages 93-103
Anonymity Control in Multi-bank E-Cash System....Pages 104-116
Efficient Asynchronous Secure Multiparty Distributed Computation....Pages 117-129
Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation....Pages 130-142
Codes Identifying Bad Signatures in Batches....Pages 143-154
Distributed Signcryption....Pages 155-164
Fail-Stop Signature for Long Messages (Extended Abstract)....Pages 165-177
Power Analysis Breaks Elliptic Curve Cryptosystems Even Secure against the Timing Attack....Pages 178-190
Efficient Construction of Cryptographically Strong Elliptic Curves....Pages 191-202
High-Speed Software Multiplication in F 2m ....Pages 203-212
On Efficient Normal Basis Multiplication....Pages 213-224
Symmetrically Private Information Retrieval....Pages 225-236
Two-Pass Authenticated Key Agreement Protocol with Key Confirmation....Pages 237-249
Anonymous Traceability Schemes with Unconditional Security....Pages 250-261
New Block Cipher DONUT Using Pairwise Perfect Decorrelation....Pages 262-270
Generating RSA Keys on a Handheld Using an Untrusted Server....Pages 271-282
A Generalized Takagi-Cryptosystem with a Modulus of the Form p r q s ....Pages 283-294