This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008.
The 25 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement from 82 submissions. The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.
Author(s): Samuel Galice, Marine Minier (auth.), Serge Vaudenay (eds.)
Series: Lecture Notes in Computer Science 5023 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008
Language: English
Pages: 420
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems
Front Matter....Pages -
Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds....Pages 1-15
Implementation of the AES-128 on Virtex-5 FPGAs....Pages 16-26
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol....Pages 27-39
Differential Cryptanalysis of Reduced-Round PRESENT....Pages 40-49
The Psychology of Security....Pages 50-79
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees....Pages 80-93
Robust Threshold Schemes Based on the Chinese Remainder Theorem....Pages 94-108
An Authentication Protocol with Encrypted Biometric Data....Pages 109-124
Authenticated Encryption Mode for Beyond the Birthday Bound Security....Pages 125-142
Cryptanalysis of the TRMS Signature Scheme of PKC’05....Pages 143-155
New Definition of Density on Knapsack Cryptosystems....Pages 156-173
Another Generalization of Wiener’s Attack on RSA....Pages 174-190
An Adaptation of the NICE Cryptosystem to Real Quadratic Orders....Pages 191-208
A Proof of Security in O (2 n ) for the Benes Scheme....Pages 209-220
Yet Another Attack on Vest....Pages 221-235
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers....Pages 236-245
Correlated Keystreams in Moustique ....Pages 246-257
Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State....Pages 258-275
Analysis of Grain’s Initialization Algorithm....Pages 276-289
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function....Pages 290-307
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?....Pages 308-324
Attribute-Based Broadcast Encryption Scheme Made Efficient....Pages 325-342
Lower Bounds for Subset Cover Based Broadcast Encryption....Pages 343-356
A Brief History of Provably-Secure Public-Key Encryption....Pages 357-370
On Compressible Pairings and Their Computation....Pages 371-388
Twisted Edwards Curves....Pages 389-405
Efficient Multiplication in $\mathbb{F}_{3^{\ell m}}$ , m ≥ 1 and 5 ≤ ℓ ≤ 18....Pages 406-414
Back Matter....Pages -