did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540770251

Progress in Cryptology - INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings

by ; ;
  • ISBN13:

    9783540770251

  • ISBN10:

    3540770259

  • Format: Paperback
  • Copyright: 2007-12-20
  • Publisher: Springer Verlag

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $119.00 Save up to $29.75
  • Buy Used
    $89.25
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The papers and three invited lectures were carefully reviewed and selected. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers.

Table of Contents

Hashing
Linearization Attacks Against Syndrome Based Hashesp. 1
A Meet-in-the-Middle Collision Attack Against the New FORK-256p. 10
Multilane HMAC - Security Beyond the Birthday Limitp. 18
Elliptic Curve
On the Bits of Elliptic Curve Diffie-Hellman Keysp. 33
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptographyp. 48
Cryptoanalysis
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknessesp. 58
Related-Key Differential-Linear Attacks on Reduced AES-192p. 73
Improved Meet-in-the-Middle Attacks on Reduced-Round DESp. 86
Information Theoretic Security
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimalityp. 101
Secret Swarm Unit Reactive [kappa]-Secret Sharing (Extended Abstract)p. 123
Elliptic Curve Cryptography
New Formulae for Efficient Elliptic Curve Arithmeticp. 138
A Graph Theoretic Analysis of Double Base Number Systemsp. 152
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplicationp. 167
Signature
Transitive Signatures from Braid Groupsp. 183
Proxy Re-signature Schemes Without Random Oraclesp. 197
Side Channel Attack
First-Order Differential Power Analysis on the Duplication Methodp. 210
Solving Discrete Logarithms from Partial Knowledge of the Keyp. 224
Symmetric Cryptosystem
New Description of SMS4 by an Embedding over GF(2[superscript 8])p. 238
Tweakable Enciphering Schemes from Hash-Sum-Expansionp. 252
A Framework for Chosen IV Statistical Analysis of Stream Ciphersp. 268
Asymmetric Cryptosystem
Public Key Encryption with Searchable Keywords Based on Jacobi Symbolsp. 282
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Powerp. 297
Short Presentation
Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residuesp. 312
On the [kappa]-Operation Linear Complexity of Periodic Sequences (Extended Abstract)p. 322
Trade-Off Traitor Tracingp. 331
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRsp. 341
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number Systemp. 351
Extended Multi-Property-Preserving and ECM-Constructionp. 361
Design of a Differential Power Analysis Resistant Masked AES S-Boxp. 373
LFSR Based Stream Ciphers Are Vulnerable to Power Attacksp. 384
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functionsp. 393
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Functionp. 404
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardwarep. 414
Author Indexp. 425
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program