Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum (auth.), Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.)3540734570, 9783540734574
The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.
Table of contents :
Front Matter….Pages –
An Analysis of the Hermes8 Stream Ciphers….Pages 1-10
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks….Pages 11-28
Strengthening NLS Against Crossword Puzzle Attack….Pages 29-44
A New Strategy for Finding a Differential Path of SHA-1….Pages 45-58
Preimage Attack on the Parallel FFT-Hashing Function….Pages 59-67
Second Preimages for Iterated Hash Functions and Their Implications on MACs….Pages 68-81
On Building Hash Functions from Multivariate Quadratic Equations….Pages 82-95
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication….Pages 96-106
Soft Generation of Secure Biometric Keys….Pages 107-121
Flaws in Some Secret Sharing Schemes Against Cheating….Pages 122-132
Efficient ( k , n ) Threshold Secret Sharing Schemes Secure Against Cheating from n − 1 Cheaters….Pages 133-142
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128….Pages 143-157
Analysis of the SMS4 Block Cipher….Pages 158-170
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme….Pages 171-183
$mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher….Pages 184-199
Anonymity on Paillier’s Trap-Door Permutation….Pages 200-214
Generic Certificateless Key Encapsulation Mechanism….Pages 215-229
Double-Size Bipartite Modular Multiplication….Pages 230-244
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography….Pages 245-258
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM….Pages 259-273
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards….Pages 274-292
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication….Pages 293-307
Certificateless Signature Revisited….Pages 308-322
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures….Pages 323-337
Hash-and-Sign with Weak Hashing Made Secure….Pages 338-354
“Sandwich” Is Indeed Secure: How to Authenticate a Message with Just One Hashing….Pages 355-369
Threshold Anonymous Group Identification and Zero-Knowledge Proof….Pages 370-384
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions….Pages 385-399
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users….Pages 400-415
Efficient and Secure Comparison for On-Line Auctions….Pages 416-430
Practical Compact E-Cash….Pages 431-445
Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks….Pages 446-460
On Proactive Perfectly Secure Message Transmission….Pages 461-473
Back Matter….Pages –
Reviews
There are no reviews yet.