Dingyi Pei, Wenliang Qin (auth.), Bimal Roy, Eiji Okamoto (eds.)3540414525, 9783540414520
Table of contents :
The Correlation of a Boolean Function with Its Variables….Pages 1-8
On Choice of Connection-Polynomials for LFSR-Based Stream Ciphers….Pages 9-18
On Resilient Boolean Functions with Maximal Possible Nonlinearity….Pages 19-30
Decimation Attack of Stream Ciphers….Pages 31-42
Cryptanalysis of the A5/1 GSM Stream Cipher….Pages 43-51
On Bias Estimation in Linear Cryptanalysis….Pages 52-66
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks….Pages 67-79
Improved Impossible Differentials on Twofish….Pages 80-92
An Online, Transferable E-Cash Payment System….Pages 93-103
Anonymity Control in Multi-bank E-Cash System….Pages 104-116
Efficient Asynchronous Secure Multiparty Distributed Computation….Pages 117-129
Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation….Pages 130-142
Codes Identifying Bad Signatures in Batches….Pages 143-154
Distributed Signcryption….Pages 155-164
Fail-Stop Signature for Long Messages (Extended Abstract)….Pages 165-177
Power Analysis Breaks Elliptic Curve Cryptosystems Even Secure against the Timing Attack….Pages 178-190
Efficient Construction of Cryptographically Strong Elliptic Curves….Pages 191-202
High-Speed Software Multiplication in F 2m ….Pages 203-212
On Efficient Normal Basis Multiplication….Pages 213-224
Symmetrically Private Information Retrieval….Pages 225-236
Two-Pass Authenticated Key Agreement Protocol with Key Confirmation….Pages 237-249
Anonymous Traceability Schemes with Unconditional Security….Pages 250-261
New Block Cipher DONUT Using Pairwise Perfect Decorrelation….Pages 262-270
Generating RSA Keys on a Handheld Using an Untrusted Server….Pages 271-282
A Generalized Takagi-Cryptosystem with a Modulus of the Form p r q s ….Pages 283-294
Reviews
There are no reviews yet.