Progress in cryptology--Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings
| 000 | 02260camuu2200493 a 4500 | |
| 001 | 000045562084 | |
| 005 | 20091127110046 | |
| 008 | 050824s2005 gw a b 101 0 eng c | |
| 010 | ▼a 2005932807 | |
| 020 | ▼a 3540289380 (pbk. : alk. paper) | |
| 020 | ▼a 9783540289388 (pbk. : alk. paper) | |
| 035 | ▼a (OCoLC)ocm61766577 | |
| 035 | ▼a (OCoLC)61766577 | |
| 035 | ▼a (KERIS)REF000012650026 | |
| 040 | ▼a OHX ▼c OHX ▼d BAKER ▼d CUS ▼d C$Q ▼d IQU ▼d VRC ▼d NLGGC ▼d DLC ▼d 211009 | |
| 042 | ▼a pcc | |
| 043 | ▼a a-my--- | |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b I5537 2005 |
| 072 | 7 | ▼a QA ▼2 lcco |
| 082 | 0 0 | ▼a 005.809595 ▼2 22 |
| 090 | ▼a 005.8 ▼b I6191p ▼c 1 | |
| 111 | 2 | ▼a International Conference on Cryptology in Malaysia ▼n (1st : ▼d 2005 : ▼c Kuala Lumpur, Malaysia) |
| 245 | 1 0 | ▼a Progress in cryptology--Mycrypt 2005 : ▼b First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings / ▼c Ed Dawson, Serge Vaudenay (eds.). |
| 246 | 3 0 | ▼a Mycrypt 2005 |
| 246 | 3 0 | ▼a Cryptology in Malaysia |
| 246 | 3 0 | ▼a First International Conference on Cryptology in Malaysia |
| 246 | 3 | ▼a 1st International Conference on Cryptology in Malaysia |
| 246 | 3 0 | ▼a International Conference on Cryptology in Malaysia |
| 260 | ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005. | |
| 300 | ▼a xi, 327 p. : ▼b ill. ; ▼c 24 cm. | |
| 490 | 1 | ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3715 |
| 504 | ▼a Includes bibliographical references and index. | |
| 530 | ▼a Also issued online. | |
| 650 | 0 | ▼a Computer security ▼z Malaysia ▼v Congresses. |
| 650 | 0 | ▼a Cryptography ▼z Malaysia ▼v Congresses. |
| 650 | 0 | ▼a Data encryption (Computer science) ▼z Malaysia ▼v Congresses. |
| 650 | 0 | ▼a Data protection ▼z Malaysia ▼v Congresses. |
| 700 | 1 | ▼a Dawson, Ed ▼q (Edward) |
| 700 | 1 | ▼a Vaudenay, Serge. |
| 830 | 0 | ▼a Lecture notes in computer science ; ▼v 3715. |
| 945 | ▼a KINS |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 I6191p 1 | 등록번호 121186785 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized by the Information Security - search Lab at Swinburne University of Technology (Sarawak Campus), NISER (National ICT Security and Emergency Response Centre) and INSPEM (Ins- tute for MathematicalResearch)at UPM (UniversityPutra Malaysia).Mycrypt 2005 was held in Kuala Lumpur, Malaysia during September 28 30 2005, in conjunction with the e-Secure Malaysia 2005 convention. Therewere90paper submissionsfrom23 countriescoveringall areasof cr- tologic research, from which 19 were accepted. We would like to extend our thanks to all authors who submitted papers to Mycrypt 2005. Each paper was sentanonymouslytoatleast3membersoftheInternationalProgramCommittee for reviews and comments. The review comments were then followed by disc- sions among the Program Committee. A recipient of the Best Paper Award was also selected after voting among Program Committee members. The winning paper was Distinguishing Attacks on T-functions by Simon Kunzli (FH A- gau, Swizerland), Pascal Junod (Nagravision SA, Switzerland) and Willi Meier (FH Aargau, Swizerland). These proceedings contain revised versions of all the accepted papers. The conference program included three keynote papers: Hideki Imai (Tokyo University)presenteda paper entitled TrendsandChallenges forSecurer Cr- tography in Practice . Moti Yung (Columbia University) presented a paper entitled E?cient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers . Colin Boyd (QUT) presented a paper entitled Security of Two-Party Identity-Based Key Agreement . We are extremely grateful for the time and e?ort of all the members of the Program Committee in the review process. Their names may be found overleaf.
정보제공 :
목차
Invited Talk I.- Trends and Challenges for Securer Cryptography in Practice.- Stream Ciphers Analysis.- Distinguishing Attacks on T-Functions.- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity.- Cryptography Based on Combinatorics.- Equivalent Keys in HFE, C , and Variations.- A New Structural Attack for GPT and Variants.- A Family of Fast Syndrome Based Cryptographic Hash Functions.- Cryptographic Protocols.- Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.- Identity Based Delegation Network.- On Session Key Construction in Provably-Secure Key Establishment Protocols.- On the Security of Probabilistic Multisignature Schemes and Their Optimality.- Invited Talk II.- Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.- Implementation Issues.- An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm.- Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.- Optimization of the MOVA Undeniable Signature Scheme.- Unconventional Cryptography.- Questionable Encryption and Its Applications.- Twin RSA.- Invited Talk III.- Security of Two-Party Identity-Based Key Agreement.- Block Cipher Cryptanalysis.- Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.- Advanced Slide Attacks Revisited: Realigning Slide on DES.- New Multiset Attacks on Rijndael with Large Blocks.- Homomorphic Encryption.- Paillier's Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes.- Homomorphic Cryptosystems Based on Subgroup Membership Problems.
정보제공 :
