Topics in Cryptology -- CT-RSA 2005: The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings

Front Cover
Alfred John Menezes
Springer Science & Business Media, Jan 24, 2005 - Business & Economics - 383 pages
The RSA Conferenceis attended by over10,000securityprofessionalseach year. The Cryptographers' Track (CT-RSA), one of several parallel tracks at the c- ference, provides an excellent opportunity for cryptographers to showcase their research to a wide audience. CT-RSA 2005 was the ?fth year of the Cryptog- phers' Track. The selection process for the CT-RSA program is the same as for other cryptography research conferences. This year, the program committee selected 23 papers from 74submissions (two of whichwerelater withdrawn) that covered all aspects of cryptography. The program also included two invited talks by Cynthia Dwork and Moti Yung. These proceedings contain the revised versions of the selected papers. The revisions were not checked, and so the authors (and not the committee) bear full responsibility for the contents of their papers. I am very grateful to the program committee for their very conscientious e'orts to review each paper fairly and thoroughly. The initial review stage was followed by a tremendous amount of discussion which contributed to our high con'denceinour judgements.Thanks alsoto the manyexternalreviewerswhose names arelisted in the followingpages.My apologiesto thosewhose nameswere inadvertently omitted from this list. Thanks to Eddie Ng for maintaining the submission server and the Web reviewsystem.ThesubmissionsoftwarewaswrittenbyChanathipNamprempre, and the Web review software by Wim Moreau and Joris Claessens. Thanks to AlfredHofmannandhiscolleaguesatSpringerforthetimelyproductionofthese proceedings.Finally, it is my pleasureto acknowledgeAri Juels and MikeSzydlo of RSA Laboratories for their assistance and cooperation during the past seven months.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Privacy with Power
1
Kleptographic Aspects
7
Resistance of SNOW 20 Against Algebraic Attacks
19
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
29
An Attack on Java SessionId Generation
44
Update on SHA1
58
A Fast Correlation Attack on the Shrinking Generator
72
Improved Efficiency for CCASecure Cryptosystems Built Using IdentityBased Encryption
87
Hard Bits of the Discrete Log with Applications to Password Authentication
209
Proofs for TwoServer Password Authentication
227
Design and Analysis of PasswordBased Key Derivation Functions
245
A New TwoParty IdentityBased Authenticated Key Agreement
262
Accumulators from Bilinear and Applications Pairings
275
Computing the Tate Pairing
293
Fast and Proven Secure Blind IdentityBased Signcryption from Pairings
305
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael SBox
323

A Generic Conversion with Optimal Redundancy
104
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES3
118
The Case of Dynamic Groups
136
TimeSelective Convertible Undeniable Signatures
154
On Tolerant Cryptographic Constructions
172
Simple PasswordBased Encrypted Key Exchange Protocols
191
Secret Key Cryptography Using Graphics Cards
334
SideChannel Leakage of Masked CMOS Gates
351
New Minimal Weight Representations for LefttoRight Window Methods
366
Author Index
384
Copyright

Other editions - View all

Common terms and phrases