Progress in Cryptology – Mycrypt 2005 First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings

Bibliographic Details
Other Authors: Dawson, Ed (Editor), Vaudenay, Serge (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2005, 2005
Edition:1st ed. 2005
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03283nmm a2200421 u 4500
001 EB000375261
003 EBX01000000000000000228313
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783540320661 
100 1 |a Dawson, Ed  |e [editor] 
245 0 0 |a Progress in Cryptology – Mycrypt 2005  |h Elektronische Ressource  |b First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings  |c edited by Ed Dawson, Serge Vaudenay 
250 |a 1st ed. 2005 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2005, 2005 
300 |a XI, 329 p  |b online resource 
505 0 |a Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers Analysis -- Distinguishing Attacks on T-Functions -- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity -- Cryptography Based on Combinatorics -- Equivalent Keys in HFE, C*, and Variations -- A New Structural Attack for GPT and Variants -- A Family of Fast Syndrome Based Cryptographic Hash Functions -- Cryptographic Protocols -- Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing -- Identity Based Delegation Network -- On Session Key Construction in Provably-Secure Key Establishment Protocols -- On the Security of Probabilistic Multisignature Schemes and Their Optimality -- Invited Talk II -- Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers -- Implementation Issues -- An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm -- Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption -- Optimization of the MOVA Undeniable Signature Scheme -- Unconventional Cryptography -- Questionable Encryption and Its Applications -- Twin RSA -- Invited Talk III -- Security of Two-Party Identity-Based Key Agreement -- Block Cipher Cryptanalysis -- Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b -- Advanced Slide Attacks Revisited: Realigning Slide on DES -- New Multiset Attacks on Rijndael with Large Blocks -- Homomorphic Encryption -- Paillier’s Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes -- Homomorphic Cryptosystems Based on Subgroup Membership Problems 
653 |a Computer Communication Networks 
653 |a Coding and Information Theory 
653 |a Coding theory 
653 |a Computer science / Mathematics 
653 |a Discrete Mathematics in Computer Science 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Algorithms 
653 |a Computer networks  
653 |a Information theory 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Discrete mathematics 
653 |a IT Operations 
700 1 |a Vaudenay, Serge  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/11554868 
856 4 0 |u https://doi.org/10.1007/11554868?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824