Markku-Juhani O. Saarinen (auth.), K. Srinathan, C. Pandu Rangan, Moti Yung (eds.)3540770259, 9783540770251
Table of contents :
Front Matter….Pages –
Linearization Attacks Against Syndrome Based Hashes….Pages 1-9
A Meet-in-the-Middle Collision Attack Against the New FORK-256….Pages 10-17
Multilane HMAC— Security beyond the Birthday Limit….Pages 18-32
On the Bits of Elliptic Curve Diffie-Hellman Keys….Pages 33-47
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography….Pages 48-57
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses….Pages 58-72
Related-Key Differential-Linear Attacks on Reduced AES-192….Pages 73-85
Improved Meet-in-the-Middle Attacks on Reduced-Round DES….Pages 86-100
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality….Pages 101-122
Secret Swarm Unit Reactive k −Secret Sharing….Pages 123-137
New Formulae for Efficient Elliptic Curve Arithmetic….Pages 138-151
A Graph Theoretic Analysis of Double Base Number Systems….Pages 152-166
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication….Pages 167-182
Transitive Signatures from Braid Groups….Pages 183-196
Proxy Re-signature Schemes Without Random Oracles….Pages 197-209
First-Order Differential Power Analysis on the Duplication Method….Pages 210-223
Solving Discrete Logarithms from Partial Knowledge of the Key….Pages 224-237
New Description of SMS4 by an Embedding overGF(2 8 )….Pages 238-251
Tweakable Enciphering Schemes from Hash-Sum-Expansion….Pages 252-267
A Framework for Chosen IV Statistical Analysis of Stream Ciphers….Pages 268-281
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols….Pages 282-296
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power….Pages 297-311
Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues….Pages 312-321
On the k -Operation Linear Complexity of Periodic Sequences….Pages 322-330
Trade-Off Traitor Tracing….Pages 331-340
X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs….Pages 341-350
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System….Pages 351-360
Extended Multi-Property-Preserving and ECM-Construction….Pages 361-372
Design of a Differential Power Analysis Resistant Masked AES S-Box….Pages 373-383
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks….Pages 384-392
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions….Pages 393-403
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function….Pages 404-413
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware….Pages 414-424
Back Matter….Pages –
Reviews
There are no reviews yet.