LEADER 06149nam 22009735 450 001 9910484450503321 005 20230412073715.0 010 $a3-540-77026-7 024 7 $a10.1007/978-3-540-77026-8 035 $a(CKB)1000000000490895 035 $a(SSID)ssj0000319624 035 $a(PQKBManifestationID)11250114 035 $a(PQKBTitleCode)TC0000319624 035 $a(PQKBWorkID)10338277 035 $a(PQKB)11235274 035 $a(DE-He213)978-3-540-77026-8 035 $a(MiAaPQ)EBC4976709 035 $a(MiAaPQ)EBC5578314 035 $a(MiAaPQ)EBC6386351 035 $a(Au-PeEL)EBL4976709 035 $a(CaONFJC)MIL134255 035 $a(OCoLC)1024249287 035 $a(Au-PeEL)EBL5578314 035 $a(OCoLC)1066186680 035 $a(PPN)123731631 035 $a(EXLCZ)991000000000490895 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProgress in Cryptology ? INDOCRYPT 2007$b[electronic resource] $e8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings /$fedited by K. Srinathan, C. Pandu Rangan, Moti Yung 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XI, 428 p.) 225 1 $aSecurity and Cryptology ;$v4859 300 $aIncludes index. 311 $a3-540-77025-9 327 $aHashing -- Linearization Attacks Against Syndrome Based Hashes -- A Meet-in-the-Middle Collision Attack Against the New FORK-256 -- Multilane HMAC? Security beyond the Birthday Limit -- Elliptic Curve -- On the Bits of Elliptic Curve Diffie-Hellman Keys -- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography -- Cryptoanalysis -- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses -- Related-Key Differential-Linear Attacks on Reduced AES-192 -- Improved Meet-in-the-Middle Attacks on Reduced-Round DES -- Information Theoretic Security -- Probabilistic Perfectly Reliable and Secure Message Transmission ? Possibility, Feasibility and Optimality -- Secret Swarm Unit Reactive k??Secret Sharing -- Elliptic Curve Cryptography -- New Formulae for Efficient Elliptic Curve Arithmetic -- A Graph Theoretic Analysis of Double Base Number Systems -- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication -- Signature -- Transitive Signatures from Braid Groups -- Proxy Re-signature Schemes Without Random Oracles -- Side Channel Attack -- First-Order Differential Power Analysis on the Duplication Method -- Solving Discrete Logarithms from Partial Knowledge of the Key -- Symmetric Cryptosystem -- New Description of SMS4 by an Embedding overGF(28) -- Tweakable Enciphering Schemes from Hash-Sum-Expansion -- A Framework for Chosen IV Statistical Analysis of Stream Ciphers -- Asymmetric Cryptosystem -- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols -- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power -- Short Presentation -- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues -- On the k-Operation Linear Complexity of Periodic Sequences -- Trade-Off Traitor Tracing -- X-FCSR ? A New Software Oriented Stream Cipher Based Upon FCSRs -- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System -- Extended Multi-Property-Preserving and ECM-Construction -- Design of a Differential Power Analysis Resistant Masked AES S-Box -- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks -- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function -- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. 330 $aThis book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers. 410 0$aSecurity and Cryptology ;$v4859 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aDiscrete mathematics 606 $aData protection 606 $aComputer networks 606 $aElectronic data processing?Management 606 $aCryptology 606 $aAlgorithms 606 $aDiscrete Mathematics in Computer Science 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aIT Operations 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aDiscrete mathematics. 615 0$aData protection. 615 0$aComputer networks. 615 0$aElectronic data processing?Management. 615 14$aCryptology. 615 24$aAlgorithms. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aIT Operations. 676 $a001.5436 686 $a004$2sdnb 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aSrinathan$b K$g(Kannan), 702 $aPandu Rangan$b C.$f1955- 702 $aYung$b Moti 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910484450503321 996 $aProgress in Cryptology – INDOCRYPT 2007$9774279 997 $aUNINA