Cryptography and Coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, Volume 11Steven D. Galbraith, Steven Galbraith This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with two invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation. |
Contents
Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise | 1 |
Galois Rings and Pseudorandom Sequences | 16 |
Finding Invalid Signatures in PairingBased Batches | 34 |
How to Forge a TimeStamp Which Adobes Acrobat Accepts | 54 |
Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions | 73 |
On the Walsh Spectrum of a New APN Function | 92 |
Heuristic Search for Approximations to SBoxes | 99 |
Cryptanalysis of the EPBC Authenticated Encryption Mode | 118 |
Modified BerlekampMassey Algorithm for Approximating the kError Linear Complexity of Binary Sequences | 220 |
Efficient KEMs with Partial Message Recovery | 233 |
Extensions and Improvements | 257 |
On the Connection Between Signcryption and OnePass Key Establishment | 277 |
Optimised Versions of the Ate and Twisted Ate Pairings | 302 |
Extractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd Characteristic | 313 |
Constructing PairingFriendly Elliptic Curves Using Gr ̈obner Basis Reduction | 336 |
Efficient 15360bit RSA Using WoopOptimised Montgomery Arithmetic | 346 |
BlockwiseAdaptive ChosenPlaintext Attack and Online Modes of Encryption | 129 |
Algebraic Cryptanalysis of the Data Encryption Standard | 152 |
Cryptographic SideChannels from LowPower Cache Memory | 170 |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures | 185 |
Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity | 204 |
Toward Acceleration of RSA Using 3D Graphics Hardware | 364 |
Multikey Hierarchical IdentityBased Signatures | 384 |
VerifierKeyFlexible Universal DesignatedVerifier Signatures | 403 |
422 | |
Other editions - View all
Common terms and phrases
ACCA ACMA adversary algebraic algorithm approximations BACPA bent functions Berlekamp-Massey Algorithm Binary bits block cipher blockwise-adaptive Boolean functions C₁ cache challenge ciphertext compute construction cryptanalysis cubic functions decapsulation decryption defined Definition denote designated-verifier DV-signature ECDSA efficient elliptic curve encapsulation encryption scheme equations exponent exponentiation extractor ffffffff ffffffff ffffffff follows given hash Heidelberg Heidelberg 2006 hyperelliptic curve identity-based IEEE implementation IND-CCA input integer invalid signatures Lemma linear cryptanalysis LNCS method mode of encryption modular multi-key HIBS multiplication nonlinearity notion obtain OpenSSL operations output parameters plaintext polynomial private key probability problem proof proposed protocol public key pk quadratic query random oracle RKEM S-box SBPA Section sequence session shader side-channel attack signcryption signcryption KEM Springer Stream Ciphers Tate pairing Theorem time-stamp twisted ate pairing unforgeability variables vector