This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2005, CT-RSA 2005, held in San Francisco, CA, USA in February 2005.
The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on cryptanalysis, public key encryption, signature schemes, design principles, password-based protocols, pairings, and efficient and secure implementations.
Author(s): Cynthia Dwork (auth.), Alfred Menezes (eds.)
Series: Lecture Notes in Computer Science 3376 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 390
Tags: Data Encryption; Discrete Mathematics in Computer Science; Operating Systems; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks
Front Matter....Pages -
Sub-linear Queries Statistical Databases: Privacy with Power....Pages 1-6
Malicious Cryptography: Kleptographic Aspects....Pages 7-18
Resistance of SNOW 2.0 Against Algebraic Attacks....Pages 19-28
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes....Pages 29-43
Hold Your Sessions: An Attack on Java Session-Id Generation....Pages 44-57
Update on SHA-1....Pages 58-71
A Fast Correlation Attack on the Shrinking Generator....Pages 72-86
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption....Pages 87-103
A Generic Conversion with Optimal Redundancy....Pages 104-117
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 ....Pages 118-135
Foundations of Group Signatures: The Case of Dynamic Groups....Pages 136-153
Time-Selective Convertible Undeniable Signatures....Pages 154-171
On Tolerant Cryptographic Constructions....Pages 172-190
Simple Password-Based Encrypted Key Exchange Protocols....Pages 191-208
Hard Bits of the Discrete Log with Applications to Password Authentication....Pages 209-226
Proofs for Two-Server Password Authentication....Pages 227-244
Design and Analysis of Password-Based Key Derivation Functions....Pages 245-261
A New Two-Party Identity-Based Authenticated Key Agreement....Pages 262-274
Accumulators from Bilinear Pairings and Applications....Pages 275-292
Computing the Tate Pairing....Pages 293-304
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings....Pages 305-322
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box....Pages 323-333
CryptoGraphics: Secret Key Cryptography Using Graphics Cards....Pages 334-350
Side-Channel Leakage of Masked CMOS Gates....Pages 351-365
New Minimal Weight Representations for Left-to-Right Window Methods....Pages 366-383
Back Matter....Pages -