Progress in Cryptology - Mycrypt 2005: First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, by Ed DawsonProgress in Cryptology - Mycrypt 2005: First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, by Ed Dawson

Progress in Cryptology - Mycrypt 2005: First International Conference on Cryptology in Malaysia…

byEd DawsonEditorSerge Vaudenay

Paperback | September 14, 2005

Pricing and Purchase Info

$136.95

Earn 685 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

review process. Their names may be found overleaf.
Title:Progress in Cryptology - Mycrypt 2005: First International Conference on Cryptology in Malaysia…Format:PaperbackDimensions:329 pages, 23.5 × 15.5 × 0.07 inPublished:September 14, 2005Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540289380

ISBN - 13:9783540289388

Look for similar items by category:

Reviews

Table of Contents

Invited Talk I.- Trends and Challenges for Securer Cryptography in Practice.- Stream Ciphers Analysis.- Distinguishing Attacks on T-Functions.- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity.- Cryptography Based on Combinatorics.- Equivalent Keys in HFE, C*, and Variations.- A New Structural Attack for GPT and Variants.- A Family of Fast Syndrome Based Cryptographic Hash Functions.- Cryptographic Protocols.- Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.- Identity Based Delegation Network.- On Session Key Construction in Provably-Secure Key Establishment Protocols.- On the Security of Probabilistic Multisignature Schemes and Their Optimality.- Invited Talk II.- Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.- Implementation Issues.- An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm.- Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.- Optimization of the MOVA Undeniable Signature Scheme.- Unconventional Cryptography.- Questionable Encryption and Its Applications.- Twin RSA.- Invited Talk III.- Security of Two-Party Identity-Based Key Agreement.- Block Cipher Cryptanalysis.- Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.- Advanced Slide Attacks Revisited: Realigning Slide on DES.- New Multiset Attacks on Rijndael with Large Blocks.- Homomorphic Encryption.- Paillier's Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes.- Homomorphic Cryptosystems Based on Subgroup Membership Problems.