LEADER 05980nam 22008775 450 001 996465898603316 005 20200704154429.0 010 $a1-280-38330-5 010 $a9786613561220 010 $a3-642-10628-5 024 7 $a10.1007/978-3-642-10628-6 035 $a(CKB)1000000000812694 035 $a(SSID)ssj0000355592 035 $a(PQKBManifestationID)11256495 035 $a(PQKBTitleCode)TC0000355592 035 $a(PQKBWorkID)10340366 035 $a(PQKB)10884669 035 $a(DE-He213)978-3-642-10628-6 035 $a(MiAaPQ)EBC3064926 035 $a(PPN)149042639 035 $a(EXLCZ)991000000000812694 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProgress in Cryptology - INDOCRYPT 2009$b[electronic resource] $e10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings /$fedited by Bimal Kumar Roy, Nicolas Sendrier 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XV, 443 p.) 225 1 $aSecurity and Cryptology ;$v5922 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-10627-7 320 $aIncludes bibliographical references and index. 327 $aPost-Quantum Cryptology -- Secure Parameters for SWIFFT -- FSBday -- Key Agreement Protocols -- Reusing Static Keys in Key Agreement Protocols -- A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols -- Side Channel Attacks -- Fault Analysis of Rabbit: Toward a Secret Key Leakage -- On Physical Obfuscation of Cryptographic Algorithms -- Cache Timing Attacks on Clefia -- Symmetric Cryptology -- Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode -- On the Symmetric Negabent Boolean Functions -- Improved Meet-in-the-Middle Attacks on AES -- Hash Functions -- Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode -- Second Preimage Attack on SHAMATA-512 -- Towards Secure and Practical MACs for Body Sensor Networks -- Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions -- A Distinguisher for the Compression Function of SIMD-512 -- Number Theoretic Cryptology -- Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree -- Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller -- A New Hard-Core Predicate of Paillier?s Trapdoor Function -- Lightweight Cryptology -- Private Interrogation of Devices via Identification Codes -- RFID Distance Bounding Multistate Enhancement -- Two Attacks against the F f RFID Protocol -- Signature Protocols -- Efficient Constructions of Signcryption Schemes and Signcryption Composability -- On Generic Constructions of Designated Confirmer Signatures -- Verifiably Encrypted Signatures from RSA without NIZKs -- Identity Based Aggregate Signcryption Schemes -- Multiparty Computation -- Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience -- Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems -- Oblivious Multi-variate Polynomial Evaluation. 330 $aThis book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009. The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation. 410 0$aSecurity and Cryptology ;$v5922 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aData structures (Computer science) 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aMathematical logic 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aMathematical Logic and Formal Languages$3https://scigraph.springernature.com/ontologies/product-market-codes/I16048 608 $aDelhi (2009)$2swd 608 $aKongress.$2swd 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aData structures (Computer science). 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aMathematical logic. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aData Structures and Information Theory. 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 615 24$aMathematical Logic and Formal Languages. 676 $a004n/a 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aRoy$b Bimal Kumar$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSendrier$b Nicolas$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference in Cryptology in India 906 $aBOOK 912 $a996465898603316 996 $aProgress in Cryptology - INDOCRYPT 2009$9773731 997 $aUNISA