Progress in Cryptology – AFRICACRYPT 2009: Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009.

The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered are hash functions, block ciphers, asymmetric encryption, digital signatures, asymmetric encryption and anonymity, key agreement protocols, cryptographic protocols, efficient implementations, and implementation attacks.

Author(s): Gaoli Wang, Shaohui Wang (auth.), Bart Preneel (eds.)
Series: Lecture Notes in Computer Science 5580 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 435
City: Berlin Heidelberg New York, NY
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems

Front Matter....Pages -
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL....Pages 1-13
Cryptanalysis of Vortex....Pages 14-28
Two Passes of Tiger Are Not One-Way....Pages 29-40
Generic Attacks on Feistel Networks with Internal Permutations....Pages 41-59
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks....Pages 60-76
Reducing Key Length of the McEliece Cryptosystem....Pages 77-97
Cryptanalysis of RSA Using the Ratio of the Primes....Pages 98-115
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes....Pages 116-134
A Schnorr-Like Lightweight Identity-Based Signature Scheme....Pages 135-148
On the Theoretical Gap between Group Signatures with and without Unlinkability....Pages 149-166
Practical Threshold Signatures with Linear Secret Sharing Schemes....Pages 167-178
Certified Encryption Revisited....Pages 179-197
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems....Pages 198-216
Anonymity from Public Key Encryption to Undeniable Signatures....Pages 217-234
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps....Pages 235-253
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness....Pages 254-271
Unifying Zero-Knowledge Proofs of Knowledge....Pages 272-286
Co-sound Zero-Knowledge with Public Keys....Pages 287-304
Another Look at Extended Private Information Retrieval Protocols....Pages 305-322
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions....Pages 323-333
Exponent Recoding and Regular Exponentiation Algorithms....Pages 334-349
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware....Pages 350-367
Fast Elliptic-Curve Cryptography on the Cell Broadband Engine....Pages 368-385
On Modular Decomposition of Integers....Pages 386-402
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed....Pages 403-420
An Improved Fault Based Attack of the Advanced Encryption Standard....Pages 421-434
Back Matter....Pages -