Progress in Cryptology ¿ INDOCRYPT 2007

8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings

Omschrijving

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers. This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The papers and three invited lectures were carefully reviewed and selected. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers. I Hashing Linearization Attacks Against Syndrome Based Hashes 1 Markku-Juhani O. Saarinen A Meet-in-the-Middle Collision Attack Against the New FORK-256 10 Markku-Juhani O. Saarinen Multilane HMAC Security Beyond the Birthday Limit 18 Kan Yasuda II Elliptic Curve On the Bits of Elliptic Curve Diffie-Hellman Keys 33 David Jao, Dimitar Jetchev, and Ramarathnam, Venkatesan A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography 48 Muralidhara V.N. and Sandeep Sen III Cryptoanalysis Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses 58 Gautham Sekar, Souradyuti Paul, and Bart Preneel Related-Key Differential-Linear Attacks on Reduced AES-192 73 Wentao Zhang, Lei Zhang, Wenling Wu, and Dengyuo Feng Improved Meet-in-the-Middle Attacks on Reduced-Round DES 86 Orr Dunkelman. Gauthant Sekar, and Bad Preneel IV Information Theoretic Security Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality 101 Kannan Srinathan, Arpita Patin, Ashish Choudhary, and C. Panda Rangan SECRET SWARM UNIT Reactive k Secret Sharing (Extended Abstract) 123 Shlomi Dolev, Limor Lahiani, and Moti Yung V Elliptic Curve Cryptography New Formulae for Efficient Elliptic Curve Arithmetic 138 Huseyin Hisil, Gary Carter, and Ed Dawson A Graph Theoretic Analysis of Double Base Number Systems 152 Pradeep Kumar Mishra and Vassil Dimitrov Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication 167 Daniel J. Bernstein, Peter Birkner, Tanya Lange, and Christiane Peters VI Signature Transitive Signatures from Braid Groups 183 Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, and Yixian Yang Proxy Re-signature Schemes Without Random Oracles 197 Jun Shao, Zhenfu Cao, Licheng Wang, and Xiaohui Liang VII Side Channel Attack First-Order Differential Power Analysis on the Duplication Method 210 Guillaume Fumaroli, Emmanuel Mayer, and Renaud Dubois Solving Discrete Logarithms from Partial Knowledge of the Key 224 K. Gopalakrishnan, Nicolas Th ault, and Chui Zhi Yao VIII Symmetric Cryptosystem New Description of SMS4 by an Embedding over GF(28) 238 Wen Ji and Lei Hu Tweakable Enciphering Schemes from Hash-Sum-Expansion 252 Kazuhiko Minematsu and Toshiyasu Matsushima A Framework for Chosen IV Statistical Analysis of Stream Ciphers 268 Hakan Englund, Thomas Johanson, and Meitem S nmez Turan IX Asymmetric Cryptosystem Public Key Encryption with Searchable Keywords Based on Jacobi Symbols 282 Giovanni Di Creseenzo and Vishal Saraswat A Certificate-Based Proxy Cryptosystein with Revocable Proxy Decryption Power Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, and Akihiro Yamamura X Short Presentation Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues 312 Muxiang Zhang On the k-Operation Linear Complexity of Periodic Sequences (Extended Abstract) 322 Ramakanth Kavuluru and Andrew Klapper Trade-Off Traitor Tracing 331 Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, and Hideki Imai X-FCSR A New Software Oriented Stream Cipher Based Upon FCSRs 341 Fran s Arnault, Thierry P. Berger, C ic Lauradoux, and Marine Minier Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System 351 Rana Barna, Sumit Kumar Pandey, and Ravi Pankaj Extended Multi-Property-Preserving and ECM-Construction 361 Lei Duo and Chao Li Design of a Differential Power Analysis Resistant Masked AES S-Box 373 Kundan Kumar, Debdeep Mukhopadhyay, and Dipanwita RoyChowdhury LFSR Based Stream Ciphers Are Vulnerable to Power Attacks 384 Sanjay Burman, Debdeep Mukhopadhyay, and Kamakoti Veezhinathan An Update on the Side Channel Cryptanalysis of MAO; Based on Cryptographic Hash Functions 393 Praveen Gauravaram and Katsuyuki Okeya Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function 404 Fr ric Didier Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware 414 Cuauhtemoc Mantillas-L pez, Debrup Chakraborty, and Francisco Rodriguez-Henriguez Author Index 425
€ 61,20
Paperback
 
Gratis verzending vanaf
€ 19,95 binnen Nederland
Schrijver
Titel
Progress in Cryptology ¿ INDOCRYPT 2007
Uitgever
Springer Berlin
Jaar
2007
Taal
Engels
Pagina's
440
Gewicht
658 gr
EAN
9783540770251
Afmetingen
229 x 152 x 19 mm
Bindwijze
Paperback

U ontvangt bij ons altijd de laatste druk!


Rubrieken

Boekstra