Progress in Cryptology - VIETCRYPT 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, in September 2006.

The 24 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections on signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption.

Author(s): Aline Gouget, Jacques Patarin (auth.), Phong Q. Nguyen (eds.)
Series: Lecture Notes in Computer Science 4341 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 388
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Systems and Data Security; Computer Communication Networks; Management of Computing and Information Systems

Front Matter....Pages -
Probabilistic Multivariate Cryptography....Pages 1-18
Short 2-Move Undeniable Signatures....Pages 19-36
Searching for Compact Algorithms: cgen ....Pages 37-49
On Pairing-Based Cryptosystems....Pages 50-66
A New Signature Scheme Without Random Oracles from Bilinear Pairings....Pages 67-80
Efficient Dynamic k -Times Anonymous Authentication....Pages 81-98
Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?....Pages 99-114
Factorization of Square-Free Integers with High Bits Known....Pages 115-130
Scalar Multiplication on Koblitz Curves Using Double Bases....Pages 131-146
Compressed Jacobian Coordinates for OEF....Pages 147-156
On the Definition of Anonymity for Ring Signatures....Pages 157-174
Escrowed Linkability of Ring Signatures and Its Applications....Pages 175-192
Dynamic Fully Anonymous Short Group Signatures....Pages 193-210
Formalizing Human Ignorance....Pages 211-228
Discrete Logarithm Variants of VSH....Pages 229-242
How to Construct Sufficient Conditions for Hash Functions....Pages 243-259
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators....Pages 260-270
On the Internal Structure of Alpha -MAC....Pages 271-285
A Weak Key Class of XTEA for a Related-Key Rectangle Attack....Pages 286-297
Deniable Group Key Agreement....Pages 298-311
An Ideal and Robust Threshold RSA....Pages 312-321
Towards Provably Secure Group Key Agreement Building on Group Theory....Pages 322-336
Universally Composable Identity-Based Encryption....Pages 337-353
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate....Pages 354-365
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption....Pages 366-384
Back Matter....Pages -