Omschrijving
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007.
The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers. This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The papers and three invited lectures were carefully reviewed and selected. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers. I Hashing
Linearization Attacks Against Syndrome Based Hashes
1
Markku-Juhani O. Saarinen
A Meet-in-the-Middle Collision Attack Against the New FORK-256
10
Markku-Juhani O. Saarinen
Multilane HMAC Security Beyond the Birthday Limit
18
Kan Yasuda
II Elliptic Curve
On the Bits of Elliptic Curve Diffie-Hellman Keys
33
David Jao, Dimitar Jetchev, and Ramarathnam, Venkatesan
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography
48
Muralidhara V.N. and Sandeep Sen
III Cryptoanalysis
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
58
Gautham Sekar, Souradyuti Paul, and Bart Preneel
Related-Key Differential-Linear Attacks on Reduced AES-192
73
Wentao Zhang, Lei Zhang, Wenling Wu, and Dengyuo Feng
Improved Meet-in-the-Middle Attacks on Reduced-Round DES
86
Orr Dunkelman. Gauthant Sekar, and Bad Preneel
IV Information Theoretic Security
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality
101
Kannan Srinathan, Arpita Patin, Ashish Choudhary, and C. Panda Rangan
SECRET SWARM UNIT Reactive k Secret Sharing (Extended Abstract)
123
Shlomi Dolev, Limor Lahiani, and Moti Yung
V Elliptic Curve Cryptography
New Formulae for Efficient Elliptic Curve Arithmetic
138
Huseyin Hisil, Gary Carter, and Ed Dawson
A Graph Theoretic Analysis of Double Base Number Systems
152
Pradeep Kumar Mishra and Vassil Dimitrov
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication
167
Daniel J. Bernstein, Peter Birkner, Tanya Lange, and Christiane Peters
VI Signature
Transitive Signatures from Braid Groups
183
Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, and Yixian Yang
Proxy Re-signature Schemes Without Random Oracles
197
Jun Shao, Zhenfu Cao, Licheng Wang, and Xiaohui Liang
VII Side Channel Attack
First-Order Differential Power Analysis on the Duplication Method
210
Guillaume Fumaroli, Emmanuel Mayer, and Renaud Dubois
Solving Discrete Logarithms from Partial Knowledge of the Key
224
K. Gopalakrishnan, Nicolas Th ault, and Chui Zhi Yao
VIII Symmetric Cryptosystem
New Description of SMS4 by an Embedding over GF(28)
238
Wen Ji and Lei Hu
Tweakable Enciphering Schemes from Hash-Sum-Expansion
252
Kazuhiko Minematsu and Toshiyasu Matsushima
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
268
Hakan Englund, Thomas Johanson, and Meitem S nmez Turan
IX Asymmetric Cryptosystem
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
282
Giovanni Di Creseenzo and Vishal Saraswat
A Certificate-Based Proxy Cryptosystein with Revocable Proxy Decryption Power
Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, and Akihiro Yamamura
X Short Presentation
Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues
312
Muxiang Zhang
On the k-Operation Linear Complexity of Periodic Sequences (Extended Abstract)
322
Ramakanth Kavuluru and Andrew Klapper
Trade-Off Traitor Tracing
331
Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, and Hideki Imai
X-FCSR A New Software Oriented Stream Cipher Based Upon FCSRs
341
Fran s Arnault, Thierry P. Berger, C ic Lauradoux, and Marine Minier
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System
351
Rana Barna, Sumit Kumar Pandey, and Ravi Pankaj
Extended Multi-Property-Preserving and ECM-Construction
361
Lei Duo and Chao Li
Design of a Differential Power Analysis Resistant Masked AES S-Box
373
Kundan Kumar, Debdeep Mukhopadhyay, and Dipanwita RoyChowdhury
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks
384
Sanjay Burman, Debdeep Mukhopadhyay, and Kamakoti Veezhinathan
An Update on the Side Channel Cryptanalysis of MAO; Based on Cryptographic Hash Functions
393
Praveen Gauravaram and Katsuyuki Okeya
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function
404
Fr ric Didier
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware
414
Cuauhtemoc Mantillas-L pez, Debrup Chakraborty, and Francisco Rodriguez-Henriguez
Author Index
425