did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540241300

Progress in Cryptology - INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings

by ;
  • ISBN13:

    9783540241300

  • ISBN10:

    3540241302

  • Format: Paperback
  • Copyright: 2005-02-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $129.00 Save up to $110.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology in India, INDOCRYPT 2004, held in Chennai, India in December 2004. The 30 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 181 submissions. The papers are organized in topical sections on cryptographic protocols, applications, stream ciphers, cryptographic Boolean functions, foundations, block ciphers, public key encryption, efficient representations, public key cryptanalysis, modes of operation, signatures, and traitor tracing and visual cryptography.

Table of Contents

Invited Talks
Design of Secure Key Establishment Protocols: Successes, Failures and Prospects
Colin Boyd
1(13)
Secure Protocols for Complex Tasks in Complex Environments
Amit Sahai
14(3)
Cryptographic Protocols
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
17(16)
The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations
Audrey Montreuil, Jacques Patarin
33(15)
Applications
On the Security of a Certified E-Mail Scheme
Guilin Wang, Feng Bao, Jianying Zhou
48(13)
Multiplicative Homomorphic E-Voting
Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
61(12)
Stream Ciphers
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers
Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
73(11)
Algebraic Attacks Over GF(q)
Lynn Margaret Batten
84(8)
Cryptographic Boolean Functions
Results on Algebraic Immunity for Cryptographically Significant Boo1ean Functions
Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
92(15)
Generalized Boolean Bent Functions
Laurent Poinsot, Sarni Harari
107(13)
On Boolean Functions with Generalized Cryptographic Properties
An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
120(16)
Foundations
Information Theory and the Security of Binary Data Perturbation
Poorvi L. Vora
136(12)
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption
Luke McAven, Reihaneh Safavi-Naini, Moti Yung
148(14)
Block Ciphers
Faster Variants of the MESH Block Ciphers
Jorge Nakahara Júnior
162(13)
Related-Key Attacks on Reduced Rounds of SHACAL-2
Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Junghwan Song
175(16)
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H
Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee
191(15)
Cryptanalysis of Ake98
Jorge Nakahara Júnior, Daniel Santana de Freitas
206(12)
Public Key Encryption
Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes
Thierry Berger, Pierre Loidreau
218(12)
HEAD: Hybrid Encryption with Delegated Decryption Capability
Palash Sarkar
230(15)
A Provably Secure Elliptic Curve Scheme with Fast Encryption
David Galindo, Sebastià Martin, Tsuyoshi Takagi, Jorge L. Villar
245(15)
Efficient Representations
Advances in Alternative Non-adjacent Form Representations
Gildas Avoine, Jean Monnerat, Thomas Peyrin
260(15)
Public Key Cryptanalysis
Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups
Françoise Levy-dit-Vehel, Ludovic Perret
275(15)
Exact Analysis of Montgomery Multiplication
Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi
290(15)
Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem
H. Gopalkrishna Gadiyar, KM Sangeeta Maini, R. Padma
305(10)
Modes of Operation
EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data
Shai Halevi
315(13)
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA
Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soohak Sung
328(15)
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
David A. McGrew, John Viega
343(13)
Signatures
Revisiting Fully Distributed Proxy Signature Schemes
Javier Herranz, Germán Sáez
356(15)
New ID-Based Threshold Signature Scheme from Bilinear Pairings
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim
371(13)
Separable Linkable Threshold Ring Signatures
Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
384(15)
Traitor Tracing and Visual Cryptography
A New Black and White Visual Cryptographic Scheme for General Access Structures
Avishek Adhikari, Tridib Kumar Dutta, Bimal Roy
399(15)
Identification Algorithms for Sequential Traitor Tracing
Marcel Fernandez, Miguel Soriano
414(17)
Author Index 431

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program