James L. Massey (auth.), Rana Barua, Tanja Lange (eds.)3540497676, 9783540497677
The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 186 submissions. The papers are organized in topical sections on symmetric cryptography: attacks, hash functions, provable security: key agreement, provable security: public key cryptograpy, symmetric cryptography: design, modes of operation and message authentication codes, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.
Table of contents :
Front Matter….Pages –
Whither Cryptography?….Pages 1-1
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4….Pages 2-16
Differential and Rectangle Attacks on Reduced-Round SHACAL-1….Pages 17-31
Algebraic Attacks on Clock-Controlled Cascade Ciphers….Pages 32-47
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication….Pages 48-62
Update on Tiger….Pages 63-79
RC4-Hash: A New Hash Function Based on RC4….Pages 80-94
Security of VSH in the Real World….Pages 95-103
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols….Pages 104-117
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols….Pages 118-132
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols….Pages 133-147
Another Look at “Provable Security”. II….Pages 148-175
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions….Pages 176-190
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures….Pages 191-205
Conditionally Verifiable Signature….Pages 206-220
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission….Pages 221-235
Using Wiedemann’s Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks….Pages 236-250
Enciphering with Arbitrary Small Finite Domains….Pages 251-265
Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240….Pages 266-279
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation….Pages 280-286
HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach….Pages 287-302
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function….Pages 303-316
A Simple and Unified Method of Proving Indistinguishability….Pages 317-334
Extended Double-Base Number System with Applications to Elliptic Curve Cryptography….Pages 335-348
CMSS – An Improved Merkle Signature Scheme….Pages 349-363
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature….Pages 364-378
Secure Cryptographic Workflow in the Standard Model….Pages 379-393
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext….Pages 394-408
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction….Pages 409-423
AES Software Implementations on ARM7TDMI….Pages 424-435
Galois LFSR, Embedded Devices and Side Channel Weaknesses….Pages 436-451
Back Matter….Pages –
Reviews
There are no reviews yet.