The third successful completion of the INDOCRYPT conference series marks the acceptance of the series by the international research community as a forum for presenting high-quality research.It also marks the coming of age of cryptology research in India. The authors for the submitted papers were spread across 21 countries and 4 continents, which goes a long way to demonstrate the international interest and visibility of INDOCRYPT.In the previous two conferences, the submissions from India originated from only two institutes; this increased to six for the 2002 conference.Thus INDOCRYPT is well set on the path to achieving two main ob jectives – to provide an international platform for presenting high-quality research and to stimulate cryptology research in India. The opportunity to serve as a program co-chair for the third INDOCRYPT carries a special satisfaction for the second editor.Way back in 1998, the sci- ti?c analysis group of DRDO organized a National Seminar on Cryptology and abbreviated it as NSCR.On attending the seminar, the second editor suggested that the conference name be changed to INDOCRYPT.It is nice to see that this suggestion was taken up, giving us the annual INDOCRYPT conference - ries.Of course, the form, character, and execution of the conference series was the combined e?ort of the entire Indian cryptographic community under the dynamic leadership of Bimal Roy.
Author(s): Joan Daemen, Vincent Rijmen (auth.), Alfred Menezes, Palash Sarkar (eds.)
Series: Lecture Notes in Computer Science 2551
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002
Language: English
Pages: 444
Tags: Computer Science, general; Operating Systems; Data Encryption; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems
Security of a Wide Trail Design....Pages 1-11
Fast Algorithms for Determining the Linear Complexity of Period Sequences....Pages 12-21
A New Class of Stream Ciphers Combining LFSR and FCSR Architectures....Pages 22-33
Slide Attack on Spectr-H64....Pages 34-47
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract)....Pages 48-61
A Variant of NTRU with Non-invertible Polynomials....Pages 62-70
Tree Replacement and Public Key Cryptosystem....Pages 71-78
Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System....Pages 79-92
Asynchronous Unconditionally Secure Computation: An Efficiency Improvement....Pages 93-107
QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI)....Pages 108-121
Towards Logically and Physically Secure Public-Key Infrastructures....Pages 122-134
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme....Pages 135-148
A 2-Secure Code with Efficient Tracing Algorithm....Pages 149-163
Reed Solomon Codes for Digital Fingerprinting....Pages 163-175
A Note on the Malleability of the El Gamal Cryptosystem....Pages 176-184
Authentication of Concast Communication....Pages 185-198
Self-certified Signatures....Pages 199-214
Identity Based Authenticated Group Key Agreement Protocol....Pages 215-233
Construction of Cryptographically Important Boolean Functions....Pages 234-245
Evolving Boolean Functions Satisfying Multiple Criteria....Pages 246-259
Further Results Related to Generalized Nonlinearity....Pages 260-274
Modular Multiplication in GF(p k ) Using Lagrange Representation....Pages 275-284
Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map....Pages 285-295
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks....Pages 296-313
The Design and Implementation of Improved Secure Cookies Based on Certificate....Pages 314-325
A Certified E-mail System with Receiver’s Selective Usage of Delivery Authority....Pages 326-338
Spending Offline Divisible Coins with Combining Capability....Pages 339-353
Efficient Object-Based Stream Authentication....Pages 354-367
The Security of a Mix-Center Based on a Semantically Secure Cryptosystem....Pages 368-381
New Identity Escrow Scheme for Anonymity Authentication....Pages 382-394
On Unconditionally Secure Distributed Oblivious Transfer....Pages 395-408
Non-perfect Secret Sharing over General Access Structures....Pages 409-421
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure....Pages 422-435