V. Kumar Murty (auth.), Subhamoy Maitra, C. E. Veni Madhavan, Ramarathnam Venkatesan (eds.)3540308059, 9783540308058
The 31 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on sequences, boolean function and S-box, hash functions, design principles, cryptanalysis, time memory trade-off, new constructions, pairings, signatures, applications, e-cash, and implementations.
Table of contents :
Front Matter….Pages –
Abelian Varieties and Cryptography….Pages 1-12
Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences….Pages 13-22
Period of Streamcipher Edon80 ….Pages 23-34
On the Algebraic Immunity of Symmetric Boolean Functions….Pages 35-48
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks….Pages 49-62
How to Construct Universal One-Way Hash Functions of Order r ….Pages 63-76
Towards Optimal Double-Length Hash Functions….Pages 77-89
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries….Pages 90-103
Design Principles for Combiners with Memory….Pages 104-117
Cryptanalysis of the Quadratic Generator….Pages 118-129
Attack the Dragon….Pages 130-142
Two Algebraic Attacks Against the F-FCSRs Using the IV Mode….Pages 143-154
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks….Pages 155-168
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY….Pages 169-182
Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints….Pages 183-196
Cryptanalysis of Barni et al. Watermarking Scheme….Pages 197-208
Completion Attacks and Weak Keys of Oleshchuk’s Public Key Cryptosystem….Pages 209-220
An Optimal Subset Cover for Broadcast Encryption….Pages 221-231
MaTRU: A New NTRU-Based Cryptosystem….Pages 232-243
Anonymous Password-Based Authenticated Key Exchange….Pages 244-257
Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism….Pages 258-269
Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme….Pages 270-282
Short Undeniable Signatures Without Random Oracles: The Missing Link….Pages 283-296
Short Threshold Signature Schemes Without Random Oracles….Pages 297-310
Attacking an Asynchronous Multi-party Contract Signing Protocol….Pages 311-321
Fairness and Correctness in Case of a Premature Abort….Pages 322-331
Short E-Cash….Pages 332-346
A Universally Composable Scheme for Electronic Cash….Pages 347-360
Energy-Privacy Trade-Offs in VLSI Computations….Pages 361-374
Modified Serial Multipliers for Type-IV Gaussian Normal Bases….Pages 375-388
Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic….Pages 389-402
SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2….Pages 403-416
Back Matter….Pages –
Reviews
There are no reviews yet.