LEADER 06571nam 22009135 450 001 996466335003316 005 20200705065454.0 010 $a3-540-89754-2 024 7 $a10.1007/978-3-540-89754-5 035 $a(CKB)1000000000545878 035 $a(SSID)ssj0000319625 035 $a(PQKBManifestationID)11237756 035 $a(PQKBTitleCode)TC0000319625 035 $a(PQKBWorkID)10338560 035 $a(PQKB)10786695 035 $a(DE-He213)978-3-540-89754-5 035 $a(MiAaPQ)EBC3063778 035 $a(MiAaPQ)EBC6281887 035 $a(PPN)132861607 035 $a(EXLCZ)991000000000545878 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProgress in Cryptology - INDOCRYPT 2008$b[electronic resource] $e9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings /$fedited by Vincent Rijmen, Dipanwita Roy Chowdhury, Abhijit Das 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XV, 437 p.) 225 1 $aSecurity and Cryptology ;$v5365 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-89753-4 320 $aIncludes bibliographical references and index. 327 $aStream Ciphers -- Slid Pairs in Salsa20 and Trivium -- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers -- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin -- New Results on the Key Scheduling Algorithm of RC4 -- Cryptographic Hash Functions -- Two Attacks on RadioGatún -- Faster Multicollisions -- A New Type of 2-Block Collisions in MD5 -- New Collision Attacks against Up to 24-Step SHA-2 -- Public-Key Cryptography ? I -- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model -- A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low -- Type-Based Proxy Re-encryption and Its Construction -- Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures -- Security Protocols -- Concrete Security for Entity Recognition: The Jane Doe Protocol -- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) -- Round Efficient Unconditionally Secure Multiparty Computation Protocol -- A New Anonymous Password-Based Authenticated Key Exchange Protocol -- Group Key Management: From a Non-hierarchical to a Hierarchical Structure -- Hardware Attacks -- Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures -- Floating Fault Analysis of Trivium -- Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection -- Block Ciphers -- New Related-Key Boomerang Attacks on AES -- New Impossible Differential Attacks on AES -- Reflection Cryptanalysis of Some Ciphers -- A Differential-Linear Attack on 12-Round Serpent -- New AES Software Speed Records -- Public-Key Cryptography ? II -- A New Class of Weak Encryption Exponents in RSA -- Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC -- Cryptographic Hardware -- Chai-Tea, Cryptographic Hardware Implementations of xTEA -- High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms -- Elliptic Curve Cryptography -- More Discriminants with the Brezing-Weng Method -- Another Approach to Pairing Computation in Edwards Coordinates -- Threshold Cryptography -- A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem -- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. 330 $aThis book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography. 410 0$aSecurity and Cryptology ;$v5365 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aComputer security 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 608 $aKharagpur (West Bengal, 2008)$2swd 608 $aKongress.$2swd 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aRijmen$b Vincent$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChowdhury$b Dipanwita Roy$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDas$b Abhijit$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference in Cryptology in India 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466335003316 996 $aProgress in Cryptology - INDOCRYPT 2008$9774128 997 $aUNISA