Hideki Imai (auth.), Ed Dawson, Serge Vaudenay (eds.)3540289380, 9783540289388
The 19 revised full papers presented together with 3 invited papers were carefully reviewed and selected from a total of 90 submissions. The papers are organized in topical sections on stream ciphers analysis, cryptography based on combinatorics, cryptographic protocols, implementation issues, unconventional cryptography, block cipher cryptanalysis, and homomorphic encryption.
Table of contents :
Front Matter….Pages –
Trends and Challenges for Securer Cryptography in Practice….Pages 1-1
Distinguishing Attacks on T-Functions….Pages 2-15
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity….Pages 16-32
Equivalent Keys in HFE, C * , and Variations….Pages 33-49
A New Structural Attack for GPT and Variants….Pages 50-63
A Family of Fast Syndrome Based Cryptographic Hash Functions….Pages 64-83
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing….Pages 84-98
Identity Based Delegation Network….Pages 99-115
On Session Key Construction in Provably-Secure Key Establishment Protocols….Pages 116-131
On the Security of Probabilistic Multisignature Schemes and Their Optimality….Pages 132-150
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers….Pages 151-170
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm….Pages 171-182
Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption….Pages 183-195
Optimization of the MOVA Undeniable Signature Scheme….Pages 196-209
Questionable Encryption and Its Applications….Pages 210-221
Twin RSA….Pages 222-228
Security of Two-Party Identity-Based Key Agreement….Pages 229-243
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b….Pages 244-262
Advanced Slide Attacks Revisited: Realigning Slide on DES….Pages 263-276
New Multiset Attacks on Rijndael with Large Blocks….Pages 277-295
Paillier’s Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes….Pages 296-313
Homomorphic Cryptosystems Based on Subgroup Membership Problems….Pages 314-327
Back Matter….Pages –
Reviews
There are no reviews yet.