This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, in September 2006.
The 24 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections on signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption.
Author(s): Aline Gouget, Jacques Patarin (auth.), Phong Q. Nguyen (eds.)
Series: Lecture Notes in Computer Science 4341 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 388
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Systems and Data Security; Computer Communication Networks; Management of Computing and Information Systems
Front Matter....Pages -
Probabilistic Multivariate Cryptography....Pages 1-18
Short 2-Move Undeniable Signatures....Pages 19-36
Searching for Compact Algorithms: cgen ....Pages 37-49
On Pairing-Based Cryptosystems....Pages 50-66
A New Signature Scheme Without Random Oracles from Bilinear Pairings....Pages 67-80
Efficient Dynamic k -Times Anonymous Authentication....Pages 81-98
Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?....Pages 99-114
Factorization of Square-Free Integers with High Bits Known....Pages 115-130
Scalar Multiplication on Koblitz Curves Using Double Bases....Pages 131-146
Compressed Jacobian Coordinates for OEF....Pages 147-156
On the Definition of Anonymity for Ring Signatures....Pages 157-174
Escrowed Linkability of Ring Signatures and Its Applications....Pages 175-192
Dynamic Fully Anonymous Short Group Signatures....Pages 193-210
Formalizing Human Ignorance....Pages 211-228
Discrete Logarithm Variants of VSH....Pages 229-242
How to Construct Sufficient Conditions for Hash Functions....Pages 243-259
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators....Pages 260-270
On the Internal Structure of Alpha -MAC....Pages 271-285
A Weak Key Class of XTEA for a Related-Key Rectangle Attack....Pages 286-297
Deniable Group Key Agreement....Pages 298-311
An Ideal and Robust Threshold RSA....Pages 312-321
Towards Provably Secure Group Key Agreement Building on Group Theory....Pages 322-336
Universally Composable Identity-Based Encryption....Pages 337-353
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate....Pages 354-365
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption....Pages 366-384
Back Matter....Pages -