Progress in Cryptology – INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Srinathan, K. (Επιμελητής έκδοσης), Rangan, C. Pandu (Επιμελητής έκδοσης), Yung, Moti (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4859
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Hashing
  • Linearization Attacks Against Syndrome Based Hashes
  • A Meet-in-the-Middle Collision Attack Against the New FORK-256
  • Multilane HMAC— Security beyond the Birthday Limit
  • Elliptic Curve
  • On the Bits of Elliptic Curve Diffie-Hellman Keys
  • A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography
  • Cryptoanalysis
  • Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
  • Related-Key Differential-Linear Attacks on Reduced AES-192
  • Improved Meet-in-the-Middle Attacks on Reduced-Round DES
  • Information Theoretic Security
  • Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality
  • Secret Swarm Unit Reactive k??Secret Sharing
  • Elliptic Curve Cryptography
  • New Formulae for Efficient Elliptic Curve Arithmetic
  • A Graph Theoretic Analysis of Double Base Number Systems
  • Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication
  • Signature
  • Transitive Signatures from Braid Groups
  • Proxy Re-signature Schemes Without Random Oracles
  • Side Channel Attack
  • First-Order Differential Power Analysis on the Duplication Method
  • Solving Discrete Logarithms from Partial Knowledge of the Key
  • Symmetric Cryptosystem
  • New Description of SMS4 by an Embedding overGF(28)
  • Tweakable Enciphering Schemes from Hash-Sum-Expansion
  • A Framework for Chosen IV Statistical Analysis of Stream Ciphers
  • Asymmetric Cryptosystem
  • Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
  • A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
  • Short Presentation
  • Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues
  • On the k-Operation Linear Complexity of Periodic Sequences
  • Trade-Off Traitor Tracing
  • X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs
  • Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System
  • Extended Multi-Property-Preserving and ECM-Construction
  • Design of a Differential Power Analysis Resistant Masked AES S-Box
  • LFSR Based Stream Ciphers Are Vulnerable to Power Attacks
  • An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
  • Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function
  • Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.