Colin Boyd (auth.), Anne Canteaut, Kapaleeswaran Viswanathan (eds.)3540241302, 9783540241300
Table of contents :
Front Matter….Pages –
Design of Secure Key Establishment Protocols: Successes, Failures and Prospects….Pages 1-13
Secure Protocols for Complex Tasks in Complex Environments….Pages 14-16
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model….Pages 17-32
The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations….Pages 33-47
On the Security of a Certified E-Mail Scheme….Pages 48-60
Multiplicative Homomorphic E-Voting….Pages 61-72
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers….Pages 73-83
Algebraic Attacks over GF ( q )….Pages 84-91
Results on Algebraic Immunity for Cryptographically Significant Boolean Functions….Pages 92-106
Generalized Boolean Bent Functions….Pages 107-119
On Boolean Functions with Generalized Cryptographic Properties….Pages 120-135
Information Theory and the Security of Binary Data Perturbation….Pages 136-147
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption….Pages 148-161
Faster Variants of the MESH Block Ciphers….Pages 162-174
Related-Key Attacks on Reduced Rounds of SHACAL-2….Pages 175-190
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H….Pages 191-205
Cryptanalysis of Ake98….Pages 206-217
Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes….Pages 218-229
HEAD : Hybrid Encryption with Delegated Decryption Capability….Pages 230-244
A Provably Secure Elliptic Curve Scheme with Fast Encryption….Pages 245-259
Advances in Alternative Non-adjacent Form Representations….Pages 260-274
Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups….Pages 275-289
Exact Analysis of Montgomery Multiplication….Pages 290-304
Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem….Pages 305-314
EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data….Pages 315-327
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA….Pages 328-342
The Security and Performance of the Galois/Counter Mode (GCM) of Operation….Pages 343-355
Revisiting Fully Distributed Proxy Signature Schemes….Pages 356-370
New ID-Based Threshold Signature Scheme from Bilinear Pairings….Pages 371-383
Separable Linkable Threshold Ring Signatures….Pages 384-398
A New Black and White Visual Cryptographic Scheme for General Access Structures….Pages 399-413
Identification Algorithms for Sequential Traitor Tracing….Pages 414-429
Back Matter….Pages –
Reviews
There are no reviews yet.