Ebook: Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings
- Tags: Data Encryption, Coding and Information Theory, Discrete Mathematics in Computer Science, Computer Communication Networks
- Series: Lecture Notes in Computer Science 3796
- Year: 2005
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
From the reviews:
"This book contains selected refereed proceedings of the tenth Institute of Mathematics and its Applications (IMA) international conference. … The book covers some important research areas in coding and cryptography. … I think anyone who wants to study or design a system for crypto-protecting sensitive data will find useful information in this book. … Books such as this are vital to ensuring the progress of theoretical and practical studies on cryptography, one of the most important technologies in the field of computer and network security." (Patriciu Victor-Valeriu, Computing Reviews, August, 2006)
This book constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, UK, in December 2005.
The 26 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on coding theory, signatures and signcryption, symmetric cryptography, side channels, algebraic cryptanalysis, information theoretic applications, number theoretic foundations, and public key and ID-based encryption schemes.
This book constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, UK, in December 2005.
The 26 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on coding theory, signatures and signcryption, symmetric cryptography, side channels, algebraic cryptanalysis, information theoretic applications, number theoretic foundations, and public key and ID-based encryption schemes.
Content:
Front Matter....Pages -
Abstract Models of Computation in Cryptography....Pages 1-12
Pairing-Based Cryptography at High Security Levels....Pages 13-36
Improved Decoding of Interleaved AG Codes....Pages 37-46
Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics....Pages 47-58
A Trellis-Based Bound on (2,1)-Separating Codes....Pages 59-67
Tessellation Based Multiple Description Coding....Pages 68-77
Exploiting Coding Theory for Collision Attacks on SHA-1....Pages 78-95
Hash Based Digital Signature Schemes....Pages 96-115
A General Construction for Simultaneous Signing and Encrypting....Pages 116-135
Non-interactive Designated Verifier Proofs and Undeniable Signatures....Pages 136-154
Partial Key Recovery Attacks on XCBC, TMAC and OMAC....Pages 155-167
Domain Expansion of MACs: Alternative Uses of the FIL-MAC....Pages 168-185
Normality of Vectorial Functions....Pages 186-200
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128....Pages 201-219
The Physically Observable Security of Signature Schemes....Pages 220-232
On the Automatic Construction of Indistinguishable Operations....Pages 233-247
Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods....Pages 248-261
An Algebraic Framework for Cipher Embeddings....Pages 262-277
Probabilistic Algebraic Attacks....Pages 278-289
Unconditionally Secure Information Authentication in Presence of Erasures....Pages 290-303
Generalized Strong Extractors and Deterministic Privacy Amplification....Pages 304-321
On Threshold Self-healing Key Distribution Schemes....Pages 322-339
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator....Pages 340-354
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited....Pages 355-375
Pairings on Elliptic Curves over Finite Commutative Rings....Pages 376-391
A Key Encapsulation Mechanism for NTRU....Pages 392-409
Efficient Identity-Based Key Encapsulation to Multiple Parties....Pages 410-427
Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme....Pages 428-441
Back Matter....Pages 442-459
....Pages -