Progress in Cryptology – AFRICACRYPT 2009 Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings /

This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Preneel, Bart (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Σειρά:Lecture Notes in Computer Science, 5580
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Hash Functions
  • Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
  • Cryptanalysis of Vortex
  • Two Passes of Tiger Are Not One-Way
  • Block Ciphers
  • Generic Attacks on Feistel Networks with Internal Permutations
  • Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
  • Asymmetric Encryption
  • Reducing Key Length of the McEliece Cryptosystem
  • Cryptanalysis of RSA Using the Ratio of the Primes
  • Digital Signatures
  • New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
  • A Schnorr-Like Lightweight Identity-Based Signature Scheme
  • On the Theoretical Gap between Group Signatures with and without Unlinkability
  • Practical Threshold Signatures with Linear Secret Sharing Schemes
  • Asymmetric Encryption and Anonymity
  • Certified Encryption Revisited
  • Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
  • Anonymity from Public Key Encryption to Undeniable Signatures
  • Key Agreement Protocols
  • Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
  • Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
  • Cryptographic Protocols
  • Unifying Zero-Knowledge Proofs of Knowledge
  • Co-sound Zero-Knowledge with Public Keys
  • Another Look at Extended Private Information Retrieval Protocols
  • Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions
  • Efficient Implementations
  • Exponent Recoding and Regular Exponentiation Algorithms
  • Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware
  • Fast Elliptic-Curve Cryptography on the Cell Broadband Engine
  • On Modular Decomposition of Integers
  • Implementation Attacks
  • Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
  • An Improved Fault Based Attack of the Advanced Encryption Standard.