Progress in Cryptology – Mycrypt 2005 First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings

Bibliographic Details
Other Authors: Dawson, Ed (Editor), Vaudenay, Serge (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2005, 2005
Edition:1st ed. 2005
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Invited Talk I
  • Trends and Challenges for Securer Cryptography in Practice
  • Stream Ciphers Analysis
  • Distinguishing Attacks on T-Functions
  • Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity
  • Cryptography Based on Combinatorics
  • Equivalent Keys in HFE, C*, and Variations
  • A New Structural Attack for GPT and Variants
  • A Family of Fast Syndrome Based Cryptographic Hash Functions
  • Cryptographic Protocols
  • Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing
  • Identity Based Delegation Network
  • On Session Key Construction in Provably-Secure Key Establishment Protocols
  • On the Security of Probabilistic Multisignature Schemes and Their Optimality
  • Invited Talk II
  • Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers
  • Implementation Issues
  • An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
  • Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption
  • Optimization of the MOVA Undeniable Signature Scheme
  • Unconventional Cryptography
  • Questionable Encryption and Its Applications
  • Twin RSA
  • Invited Talk III
  • Security of Two-Party Identity-Based Key Agreement
  • Block Cipher Cryptanalysis
  • Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b
  • Advanced Slide Attacks Revisited: Realigning Slide on DES
  • New Multiset Attacks on Rijndael with Large Blocks
  • Homomorphic Encryption
  • Paillier’s Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes
  • Homomorphic Cryptosystems Based on Subgroup Membership Problems