Cargando…

Progress in Cryptology - INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Srinathan, K. (Editor ), Pandu Rangan, C. (Editor ), Yung, Moti (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Security and Cryptology ; 4859
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Hashing
  • Linearization Attacks Against Syndrome Based Hashes
  • A Meet-in-the-Middle Collision Attack Against the New FORK-256
  • Multilane HMAC- Security beyond the Birthday Limit
  • Elliptic Curve
  • On the Bits of Elliptic Curve Diffie-Hellman Keys
  • A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography
  • Cryptoanalysis
  • Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
  • Related-Key Differential-Linear Attacks on Reduced AES-192
  • Improved Meet-in-the-Middle Attacks on Reduced-Round DES
  • Information Theoretic Security
  • Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality
  • Secret Swarm Unit Reactive k??Secret Sharing
  • Elliptic Curve Cryptography
  • New Formulae for Efficient Elliptic Curve Arithmetic
  • A Graph Theoretic Analysis of Double Base Number Systems
  • Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication
  • Signature
  • Transitive Signatures from Braid Groups
  • Proxy Re-signature Schemes Without Random Oracles
  • Side Channel Attack
  • First-Order Differential Power Analysis on the Duplication Method
  • Solving Discrete Logarithms from Partial Knowledge of the Key
  • Symmetric Cryptosystem
  • New Description of SMS4 by an Embedding overGF(28)
  • Tweakable Enciphering Schemes from Hash-Sum-Expansion
  • A Framework for Chosen IV Statistical Analysis of Stream Ciphers
  • Asymmetric Cryptosystem
  • Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
  • A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
  • Short Presentation
  • Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues
  • On the k-Operation Linear Complexity of Periodic Sequences
  • Trade-Off Traitor Tracing
  • X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs
  • Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System
  • Extended Multi-Property-Preserving and ECM-Construction
  • Design of a Differential Power Analysis Resistant Masked AES S-Box
  • LFSR Based Stream Ciphers Are Vulnerable to Power Attacks
  • An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
  • Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function
  • Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.