Progress in Cryptology – Mycrypt 2005: First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 3715 : Security and Cryptology

ISBN: 3540289380, 9783540289388

Size: 3 MB (2896909 bytes)

Pages: 329/337

File format:

Language:

Publishing Year:

Category: Tags: , , , ,

Hideki Imai (auth.), Ed Dawson, Serge Vaudenay (eds.)3540289380, 9783540289388

This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Malaysia, held in Kuala Lumpur, Malaysia in September 2005, in conjunction with the e-Secure Malaysia 2005 convention.

The 19 revised full papers presented together with 3 invited papers were carefully reviewed and selected from a total of 90 submissions. The papers are organized in topical sections on stream ciphers analysis, cryptography based on combinatorics, cryptographic protocols, implementation issues, unconventional cryptography, block cipher cryptanalysis, and homomorphic encryption.


Table of contents :
Front Matter….Pages –
Trends and Challenges for Securer Cryptography in Practice….Pages 1-1
Distinguishing Attacks on T-Functions….Pages 2-15
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity….Pages 16-32
Equivalent Keys in HFE, C * , and Variations….Pages 33-49
A New Structural Attack for GPT and Variants….Pages 50-63
A Family of Fast Syndrome Based Cryptographic Hash Functions….Pages 64-83
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing….Pages 84-98
Identity Based Delegation Network….Pages 99-115
On Session Key Construction in Provably-Secure Key Establishment Protocols….Pages 116-131
On the Security of Probabilistic Multisignature Schemes and Their Optimality….Pages 132-150
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers….Pages 151-170
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm….Pages 171-182
Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption….Pages 183-195
Optimization of the MOVA Undeniable Signature Scheme….Pages 196-209
Questionable Encryption and Its Applications….Pages 210-221
Twin RSA….Pages 222-228
Security of Two-Party Identity-Based Key Agreement….Pages 229-243
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b….Pages 244-262
Advanced Slide Attacks Revisited: Realigning Slide on DES….Pages 263-276
New Multiset Attacks on Rijndael with Large Blocks….Pages 277-295
Paillier’s Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes….Pages 296-313
Homomorphic Cryptosystems Based on Subgroup Membership Problems….Pages 314-327
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Progress in Cryptology – Mycrypt 2005: First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005. Proceedings”
Shopping Cart
Scroll to Top