Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings

Bibliographic Details
Other Authors: Maitra, Subhamoy (Editor), Madhavan, C.E. Veni (Editor), Venkatesan, Ramarathnam (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2005, 2005
Edition:1st ed. 2005
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Invited Talk
  • Abelian Varieties and Cryptography
  • Sequences
  • Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences
  • Period of Streamcipher Edon80
  • Boolean Function and S-Box
  • On the Algebraic Immunity of Symmetric Boolean Functions
  • On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
  • Hash Functions
  • How to Construct Universal One-Way Hash Functions of Order r
  • Towards Optimal Double-Length Hash Functions
  • Design Principles
  • Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries
  • Design Principles for Combiners with Memory
  • Cryptanalysis I
  • Cryptanalysis of the Quadratic Generator
  • Attack the Dragon
  • Two Algebraic Attacks Against the F-FCSRs Using the IV Mode
  • Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks
  • Time Memory Trade-Off
  • TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY
  • Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints
  • Cryptanalysis II
  • Cryptanalysis of Barni et al. Watermarking Scheme
  • Completion Attacks and Weak Keys of Oleshchuk’s Public Key Cryptosystem
  • New Constructions
  • An Optimal Subset Cover for Broadcast Encryption
  • MaTRU: A New NTRU-Based Cryptosystem
  • Anonymous Password-Based Authenticated Key Exchange
  • Pairings
  • Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism
  • Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme
  • Signatures
  • Short Undeniable Signatures Without Random Oracles: The Missing Link
  • Short Threshold Signature Schemes Without Random Oracles
  • Applications
  • Attacking an Asynchronous Multi-party Contract Signing Protocol
  • Fairness and Correctness in Case of a Premature Abort.-E-Cash
  • Short E-Cash
  • A Universally Composable Scheme for Electronic Cash
  • Implementations
  • Energy-Privacy Trade-Offs in VLSI Computations
  • Modified Serial Multipliers for Type-IV Gaussian Normal Bases
  • Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic
  • SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2