Rosario Gennaro, Daniele Micciancio (auth.), Lars R. Knudsen (eds.)3540435530, 9783540435532
The 33 revised full papers presented were carefully reviewed and selected from a total of 122 submissions. The papers are organized in topical sections on cryptanalysis, public-key encryption, information theory and new models, implementational analysis, stream ciphers, digital signatures, key exchange, modes of operation, traitor tracing and id-based encryption, multiparty and multicast, and symmetric cryptology.
Table of contents :
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups….Pages 1-13
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups….Pages 14-28
Extending the GHS Weil Descent Attack….Pages 29-44
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption….Pages 45-64
Key-Insulated Public Key Cryptosystems….Pages 65-82
On the Security of Joint Signature and Encryption….Pages 83-107
AES and the Wide Trail Design Strategy….Pages 108-109
Indistinguishability of Random Systems….Pages 110-132
How to Fool an Unbounded Adversary with a Short Key….Pages 133-148
Cryptography in an Unbounded Computational Model….Pages 149-164
Performance Analysis and Parallel Implementation of Dedicated Hash Functions….Pages 165-180
Fault Injection and a Timing Channel on an Analysis Technique….Pages 181-196
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms….Pages 197-208
Fast Correlation Attacks: An Algorithmic Point of View….Pages 209-221
BDD-Based Cryptanalysis of Keystream Generators….Pages 222-237
Linear Cryptanalysis of Bluetooth Stream Cipher….Pages 238-255
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups….Pages 256-271
Optimal Security Proofs for PSS and Other Signature Schemes….Pages 272-287
Cryptanalysis of SFLASH….Pages 288-298
Cryptanalysis of the Revised NTRU Signature Scheme….Pages 299-320
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions….Pages 321-336
Universally Composable Notions of Key Exchange and Secure Channels….Pages 337-351
On Deniability in Quantum Key Exchange….Pages 352-367
A Practice-Oriented Treatment of Pseudorandom Number Generators….Pages 368-383
A Block-Cipher Mode of Operation for Parallelizable Message Authentication….Pages 384-397
Rethinking PKI: What’s Trust Got to Do with It?….Pages 398-399
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods….Pages 400-417
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security….Pages 418-433
Security Notions for Unconditionally Secure Signature Schemes….Pages 434-449
Traitor Tracing with Constant Transmission Rate….Pages 450-465
Toward Hierarchical Identity-Based Encryption….Pages 466-481
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch….Pages 482-501
Perfectly Secure Message Transmission Revisited….Pages 502-517
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis….Pages 518-533
Security Flaws Induced by CBC Padding — Applications to SSL, IPSEC, WTLS…….Pages 534-545
Reviews
There are no reviews yet.