Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Maitra, Subhamoy (Επιμελητής έκδοσης), Veni Madhavan, C. E. (Επιμελητής έκδοσης), Venkatesan, Ramarathnam (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3797
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talk
  • Abelian Varieties and Cryptography
  • Sequences
  • Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences
  • Period of Streamcipher Edon80
  • Boolean Function and S-Box
  • On the Algebraic Immunity of Symmetric Boolean Functions
  • On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
  • Hash Functions
  • How to Construct Universal One-Way Hash Functions of Order r
  • Towards Optimal Double-Length Hash Functions
  • Design Principles
  • Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries
  • Design Principles for Combiners with Memory
  • Cryptanalysis I
  • Cryptanalysis of the Quadratic Generator
  • Attack the Dragon
  • Two Algebraic Attacks Against the F-FCSRs Using the IV Mode
  • Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks
  • Time Memory Trade-Off
  • TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY
  • Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints
  • Cryptanalysis II
  • Cryptanalysis of Barni et al. Watermarking Scheme
  • Completion Attacks and Weak Keys of Oleshchuk’s Public Key Cryptosystem
  • New Constructions
  • An Optimal Subset Cover for Broadcast Encryption
  • MaTRU: A New NTRU-Based Cryptosystem
  • Anonymous Password-Based Authenticated Key Exchange
  • Pairings
  • Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism
  • Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme
  • Signatures
  • Short Undeniable Signatures Without Random Oracles: The Missing Link
  • Short Threshold Signature Schemes Without Random Oracles
  • Applications
  • Attacking an Asynchronous Multi-party Contract Signing Protocol
  • Fairness and Correctness in Case of a Premature Abort
  • E-Cash
  • Short E-Cash
  • A Universally Composable Scheme for Electronic Cash
  • Implementations
  • Energy-Privacy Trade-Offs in VLSI Computations
  • Modified Serial Multipliers for Type-IV Gaussian Normal Bases
  • Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic
  • SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2.