密码法进展 INDOCRYPT2006

密码法进展 INDOCRYPT2006
作 者: Rana Barua 
出版社: 湖南文艺出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《密码法进展 INDOCRYPT2006》作者简介

内容简介

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006.The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 186 submissions. The papers are organized in topical sections on symmetric cryptography: attacks, hash functions, provable security: key agreement, provable security: public key cryptograpy, symmetric cryptography: design, modes of operation and message authentication codes, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.

图书目录

Invited Talk

Whither Cryptography?

Symmetric Cryptography: Attacks

 Non-randomness in eSTREAM Candidates Salsa20 and TSC-4

 Differential and Rectangle Attacks on Reduced-Round SHACAL-1

 Algebraic Attacks on Clock-Controlled Cascade Ciphers

 An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication

Hash Functions

 Update on Tiger

 RC4-Hash: A New Hash Function Based on RC4

 Security of VSH in the Real World

Provable Security:Key Agreement

 Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols

 Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols

 On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols

Invited Talk

 Another Look at "Provable Security". II

Provable Security: Public Key Cryptography

 Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions

 General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

 Conditionally Verifiable Signature

 Constant Phase Bit Optimal Protocols fox Perfectly Reliable and Secure Message Transmission

Symmetric Cryptography: Design

 Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks

……

Modes of Operation and Message Authentication Codes

Fast Implementation of Public Key Cryptogyaphy

ID-Based Cryptography

Embedded System and Side Channel Attacks

Author Index