This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The papers and three invited lectures were carefully reviewed and selected. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers.
Author(s): Markku-Juhani O. Saarinen (auth.), K. Srinathan, C. Pandu Rangan, Moti Yung (eds.)
Series: Lecture Notes in Computer Science 4859
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 428
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Systems and Data Security; Computer Communication Networks; Management of Computing and Information Systems
Front Matter....Pages -
Linearization Attacks Against Syndrome Based Hashes....Pages 1-9
A Meet-in-the-Middle Collision Attack Against the New FORK-256....Pages 10-17
Multilane HMAC— Security beyond the Birthday Limit....Pages 18-32
On the Bits of Elliptic Curve Diffie-Hellman Keys....Pages 33-47
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography....Pages 48-57
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses....Pages 58-72
Related-Key Differential-Linear Attacks on Reduced AES-192....Pages 73-85
Improved Meet-in-the-Middle Attacks on Reduced-Round DES....Pages 86-100
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality....Pages 101-122
Secret Swarm Unit Reactive k −Secret Sharing....Pages 123-137
New Formulae for Efficient Elliptic Curve Arithmetic....Pages 138-151
A Graph Theoretic Analysis of Double Base Number Systems....Pages 152-166
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication....Pages 167-182
Transitive Signatures from Braid Groups....Pages 183-196
Proxy Re-signature Schemes Without Random Oracles....Pages 197-209
First-Order Differential Power Analysis on the Duplication Method....Pages 210-223
Solving Discrete Logarithms from Partial Knowledge of the Key....Pages 224-237
New Description of SMS4 by an Embedding overGF(2 8 )....Pages 238-251
Tweakable Enciphering Schemes from Hash-Sum-Expansion....Pages 252-267
A Framework for Chosen IV Statistical Analysis of Stream Ciphers....Pages 268-281
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols....Pages 282-296
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power....Pages 297-311
Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues....Pages 312-321
On the k -Operation Linear Complexity of Periodic Sequences....Pages 322-330
Trade-Off Traitor Tracing....Pages 331-340
X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs....Pages 341-350
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System....Pages 351-360
Extended Multi-Property-Preserving and ECM-Construction....Pages 361-372
Design of a Differential Power Analysis Resistant Masked AES S-Box....Pages 373-383
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks....Pages 384-392
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions....Pages 393-403
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function....Pages 404-413
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware....Pages 414-424
Back Matter....Pages -