Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.)3540666664, 9783540666660
Table of contents :
Front Matter….Pages –
Modulus Search for Elliptic Curve Cryptosystems….Pages 1-7
On the Lai-Massey Scheme….Pages 8-19
On Cryptographically Secure Vectorial Boolean Functions….Pages 20-28
Equivalent Keys of HPC….Pages 29-42
Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials….Pages 43-51
Cryptanalysis of Two Cryptosystems Based on Group Actions….Pages 52-61
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions….Pages 62-74
Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field….Pages 75-85
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves….Pages 86-102
Speeding up the Discrete Log Computation on Curves with Automorphisms….Pages 103-121
ECC: Do We Need to Count?….Pages 122-134
Elliptic Scalar Multiplication Using Point Halving….Pages 135-149
On the Design of RSA with Short Secret Exponent….Pages 150-164
Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries….Pages 165-179
Adaptively-Secure Optimal-Resilience Proactive RSA….Pages 180-194
Factorization of RSA-140 Using the Number Field Sieve….Pages 195-207
How to Prove That a Committed Number Is Prime….Pages 208-218
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields….Pages 219-231
General Adversaries in Unconditional Multi-party Computation….Pages 232-246
Approximation Hardness and Secure Communication in Broadcast Channels….Pages 247-257
Mix-Networks on Permutation Networks….Pages 258-273
Secure Communication in an Unknown Network Using Certificates….Pages 274-287
Linear Complexity versus Pseudorandomness: On Beth and Dai’s Result….Pages 288-298
A Class of Explicit Perfect Multi-sequences….Pages 299-305
Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function….Pages 306-320
Doing More with Fewer Bits….Pages 321-332
A Quick Group Key Distribution Scheme with “Entity Revocation”….Pages 333-347
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks….Pages 348-362
Periodical Multi-secret Threshold Cryptosystems….Pages 363-377
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm….Pages 378-389
A 3 -Codes under Collusion Attacks….Pages 390-398
Broadcast Authentication in Group Communication….Pages 399-412
Back Matter….Pages –
Reviews
There are no reviews yet.