LEADER 06324nam 22008295 450 001 9910483738203321 005 20251226203533.0 024 7 $a10.1007/11586821 035 $a(CKB)1000000000213526 035 $a(SSID)ssj0000317073 035 $a(PQKBManifestationID)11274465 035 $a(PQKBTitleCode)TC0000317073 035 $a(PQKBWorkID)10287785 035 $a(PQKB)10254162 035 $a(DE-He213)978-3-540-32418-8 035 $a(MiAaPQ)EBC3067771 035 $a(PPN)123098572 035 $a(BIP)13210699 035 $a(EXLCZ)991000000000213526 100 $a20100412d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptography and Coding $e10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings /$fedited by Nigel Smart 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 468 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3796 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$aPrinted edition: 9783540302766 320 $aIncludes bibliographical references and index. 327 $aInvited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploiting Coding Theory for Collision Attacks on SHA-1 -- Signatures and Signcryption -- Hash Based Digital Signature Schemes -- A General Construction for Simultaneous Signing and Encrypting -- Non-interactive Designated Verifier Proofs and Undeniable Signatures -- Symmetric Cryptography -- Partial Key Recovery Attacks on XCBC, TMAC and OMAC -- Domain Expansion of MACs: Alternative Uses of the FIL-MAC -- Normality of Vectorial Functions -- Related-Key Differential Attacks on Cobra-H64 and Cobra-H128 -- Side Channels -- The Physically Observable Security of Signature Schemes -- On the Automatic Construction of Indistinguishable Operations -- Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods -- Algebraic Cryptanalysis -- Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem -- An Algebraic Framework for Cipher Embeddings -- Probabilistic Algebraic Attacks -- Information Theoretic Applications -- Unconditionally Secure Information Authentication in Presence of Erasures -- Generalized Strong Extractors and Deterministic Privacy Amplification -- On Threshold Self-healing Key Distribution Schemes -- Number Theoretic Foundations -- Concrete Security of the Blum-Blum-Shub Pseudorandom Generator -- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited -- Pairings on Elliptic Curves over Finite Commutative Rings -- Public Key and ID-Based Encryption Schemes -- A Key Encapsulation Mechanism for NTRU -- Efficient Identity-Based Key Encapsulation to Multiple Parties -- Security Proof of Sakai-Kasahara?s Identity-Based Encryption Scheme. 330 $aThe10thintheseriesofIMAConferencesonCryptographyandCodingwasheld at the RoyalAgricultural College, Cirencester, during 19-21 December 2005. As usual, the venue provided a relaxed and informal atmosphere for attendees to discuss work and listen to the collection of talks. The program consisted of four invited talks and 26 contributed talks. The invitedtalkswheregivenbyTuviEtzion,UeliMaurer,AlfredMenezesandAmin Shokrollahi, and three of these invited talks appear as papers in this volume. Special thanks must go to these four speakers as they helped to set the tone, by coveringall the areasthe meeting aimed to cover,from cryptographythrough to coding. In addition the best speakers are often the hardest to persuade to come to a meeting, as they are usually the most busy. We therefore feel privileged to have had a meeting with four such distinguished speakers. The contributed talks were selected from 94 submissions. This is nearly twice thenumberofsubmissionsforthepreviousmeetingin2003.Thisisanindication of the strength of the subject and the interest in the IMA series of meetings as a venue to present new work. The contributed talks ranged over a wide number of areas, including information theory, coding theory, number theory and as- metric and symmetric cryptography. Subtopics included a number of current "hot topics," such as algebraic cryptanalysis and cryptographic systems based on bilinear pairings. Assembling the conference program and these proceedings required the help of a large number of individuals. I would like to thank them all here. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3796 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science 606 $aCoding theory 606 $aInformation theory 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aComputer networks 606 $aCryptology 606 $aTheory of Computation 606 $aCoding and Information Theory 606 $aDiscrete Mathematics in Computer Science 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aTheory of Computation. 615 24$aCoding and Information Theory. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 676 $a005.82 701 $aSmart$b Nigel P$g(Nigel Paul),$f1967-$053999 712 12$aIMA International Conference 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483738203321 996 $aCryptography and coding$94203314 997 $aUNINA