Progress in Cryptology – Mycrypt 2005 | First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings | ISBN 9783540320661

Progress in Cryptology – Mycrypt 2005

First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings

herausgegeben von Ed Dawson und Serge Vaudenay
Mitwirkende
Herausgegeben vonEd Dawson
Herausgegeben vonSerge Vaudenay
Buchcover Progress in Cryptology – Mycrypt 2005  | EAN 9783540320661 | ISBN 3-540-32066-0 | ISBN 978-3-540-32066-1

Progress in Cryptology – Mycrypt 2005

First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings

herausgegeben von Ed Dawson und Serge Vaudenay
Mitwirkende
Herausgegeben vonEd Dawson
Herausgegeben vonSerge Vaudenay

Inhaltsverzeichnis

  • Invited Talk I.
  • Trends and Challenges for Securer Cryptography in Practice.
  • Stream Ciphers Analysis.
  • Distinguishing Attacks on T-Functions.
  • Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity.
  • Cryptography Based on Combinatorics.
  • Equivalent Keys in HFE, C*, and Variations.
  • A New Structural Attack for GPT and Variants.
  • A Family of Fast Syndrome Based Cryptographic Hash Functions.
  • Cryptographic Protocols.
  • Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.
  • Identity Based Delegation Network.
  • On Session Key Construction in Provably-Secure Key Establishment Protocols.
  • On the Security of Probabilistic Multisignature Schemes and Their Optimality.
  • Invited Talk II.
  • Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
  • Implementation Issues.
  • An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm.
  • Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption.
  • Optimization of the MOVA Undeniable Signature Scheme.
  • Unconventional Cryptography.
  • Questionable Encryption and Its Applications.
  • Twin RSA.
  • Invited Talk III.
  • Security of Two-Party Identity-Based Key Agreement.
  • Block Cipher Cryptanalysis.
  • Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.
  • Advanced Slide Attacks Revisited: Realigning Slide on DES.
  • New Multiset Attacks on Rijndael with Large Blocks.
  • Homomorphic Encryption.
  • Paillier’s Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes.
  • Homomorphic Cryptosystems Based on Subgroup Membership Problems.