Progress in Cryptology - INDOCRYPT 2006 -

Progress in Cryptology - INDOCRYPT 2006

7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings

Rana Barua, Tanja Lange (Herausgeber)

Buch | Softcover
XIV, 458 Seiten
2006 | 2006
Springer Berlin (Verlag)
978-3-540-49767-7 (ISBN)
53,49 inkl. MwSt
lt;p>This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006. The 29 revised full papers and 2 invited papers cover such topics as symmetric cryptography, provable security, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.

Invited Talk.- Whither Cryptography?.- Symmetric Cryptography: Attacks.- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4.- Differential and Rectangle Attacks on Reduced-Round SHACAL-1.- Algebraic Attacks on Clock-Controlled Cascade Ciphers.- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.- Hash Functions.- Update on Tiger.- RC4-Hash: A New Hash Function Based on RC4.- Security of VSH in the Real World.- Provable Security: Key Agreement.- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols.- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols.- Invited Talk.- Another Look at "Provable Security". II.- Provable Security: Public Key Cryptography.- Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions.- General Conversion for Obtaining Strongly Existentially Unforgeable Signatures.- Conditionally Verifiable Signature.- Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission.- Symmetric Cryptography: Design.- Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks.- Enciphering with Arbitrary Small Finite Domains.- Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240.- Modes of Operation and Message Authentication Codes.- Symmetric Nonce Respecting Security Model and the MEM Mode of Operation.- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach.- Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.- A Simple and Unified Methodof Proving Indistinguishability.- Fast Implementation of Public Key Cryptography.- Extended Double-Base Number System with Applications to Elliptic Curve Cryptography.- CMSS - An Improved Merkle Signature Scheme.- ID-Based Cryptography.- Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.- Secure Cryptographic Workflow in the Standard Model.- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext.- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.- Embedded System and Side Channel Attacks.- AES Software Implementations on ARM7TDMI.- Galois LFSR, Embedded Devices and Side Channel Weaknesses.

Erscheint lt. Verlag 27.11.2006
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XIV, 458 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 702 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte algorithm • Algorithm analysis and problem complexity • algorithms • anonymity • authentication • boolean function • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Data Security • didgital signature schemes • Elliptic Curve Cryptography • Embedded Systems • encryption schemes • hash function • identity based encryption • Information Security • Public Key • Public Key Cryptography • Radio-Frequency Identification (RFID) • Secure Communications • Security models • side channel attacks • symmetric cryptography • Systems Security
ISBN-10 3-540-49767-6 / 3540497676
ISBN-13 978-3-540-49767-7 / 9783540497677
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich