This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Malaysia, held in Kuala Lumpur, Malaysia in September 2005, in conjunction with the e-Secure Malaysia 2005 convention.
The 19 revised full papers presented together with 3 invited papers were carefully reviewed and selected from a total of 90 submissions. The papers are organized in topical sections on stream ciphers analysis, cryptography based on combinatorics, cryptographic protocols, implementation issues, unconventional cryptography, block cipher cryptanalysis, and homomorphic encryption.
Author(s): Hideki Imai (auth.), Ed Dawson, Serge Vaudenay (eds.)
Series: Lecture Notes in Computer Science 3715 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 329
Tags: Data Encryption; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems
Front Matter....Pages -
Trends and Challenges for Securer Cryptography in Practice....Pages 1-1
Distinguishing Attacks on T-Functions....Pages 2-15
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity....Pages 16-32
Equivalent Keys in HFE, C * , and Variations....Pages 33-49
A New Structural Attack for GPT and Variants....Pages 50-63
A Family of Fast Syndrome Based Cryptographic Hash Functions....Pages 64-83
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing....Pages 84-98
Identity Based Delegation Network....Pages 99-115
On Session Key Construction in Provably-Secure Key Establishment Protocols....Pages 116-131
On the Security of Probabilistic Multisignature Schemes and Their Optimality....Pages 132-150
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers....Pages 151-170
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm....Pages 171-182
Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption....Pages 183-195
Optimization of the MOVA Undeniable Signature Scheme....Pages 196-209
Questionable Encryption and Its Applications....Pages 210-221
Twin RSA....Pages 222-228
Security of Two-Party Identity-Based Key Agreement....Pages 229-243
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b....Pages 244-262
Advanced Slide Attacks Revisited: Realigning Slide on DES....Pages 263-276
New Multiset Attacks on Rijndael with Large Blocks....Pages 277-295
Paillier’s Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes....Pages 296-313
Homomorphic Cryptosystems Based on Subgroup Membership Problems....Pages 314-327
Back Matter....Pages -