Progress in cryptology
Autoren
Mehr zum Buch
InhaltsverzeichnisInvited Talk.Whither Cryptography?.Symmetric Cryptography: Attacks.Non-randomness in eSTREAM Candidates Salsa20 and TSC-4.Differential and Rectangle Attacks on Reduced-Round SHACAL-1.Algebraic Attacks on Clock-Controlled Cascade Ciphers.An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.Hash Functions.Update on Tiger.RC4-Hash: A New Hash Function Based on RC4.Security of VSH in the Real World.Provable Security: Key Agreement.Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols.Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols.Another Look at “Provable Security”. II.Provable Security: Public Key Cryptography.Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions.General Conversion for Obtaining Strongly Existentially Unforgeable Signatures.Conditionally Verifiable Signature.Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission.Symmetric Cryptography: Design.Using Wiedemann’s Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks.Enciphering with Arbitrary Small Finite Domains.Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240.Modes of Operation and Message Authentication Codes.Symmetric Nonce Respecting Security Model and the MEM Mode of Operation.HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach.Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.A Simple and Unified Methodof Proving Indistinguishability.Fast Implementation of Public Key Cryptography.Extended Double-Base Number System with Applications to Elliptic Curve Cryptography.CMSS – An Improved Merkle Signature Scheme.ID-Based Cryptography.Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.Secure Cryptographic Workflow in the Standard Model.Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext.Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.Embedded System and Side Channel Attacks.AES Software Implementations on ARM7TDMI.Galois LFSR, Embedded Devices and Side Channel Weaknesses.