Cryptography and Coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, Volume 11

Front Cover
Steven D. Galbraith, Steven Galbraith
Springer Science & Business Media, Dec 10, 2007 - Computers - 421 pages

This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with two invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.

 

Contents

Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise
1
Galois Rings and Pseudorandom Sequences
16
Finding Invalid Signatures in PairingBased Batches
34
How to Forge a TimeStamp Which Adobes Acrobat Accepts
54
Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions
73
On the Walsh Spectrum of a New APN Function
92
Heuristic Search for Approximations to SBoxes
99
Cryptanalysis of the EPBC Authenticated Encryption Mode
118
Modified BerlekampMassey Algorithm for Approximating the kError Linear Complexity of Binary Sequences
220
Efficient KEMs with Partial Message Recovery
233
Extensions and Improvements
257
On the Connection Between Signcryption and OnePass Key Establishment
277
Optimised Versions of the Ate and Twisted Ate Pairings
302
Extractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd Characteristic
313
Constructing PairingFriendly Elliptic Curves Using Gr ̈obner Basis Reduction
336
Efficient 15360bit RSA Using WoopOptimised Montgomery Arithmetic
346

BlockwiseAdaptive ChosenPlaintext Attack and Online Modes of Encryption
129
Algebraic Cryptanalysis of the Data Encryption Standard
152
Cryptographic SideChannels from LowPower Cache Memory
170
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
185
Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity
204
Toward Acceleration of RSA Using 3D Graphics Hardware
364
Multikey Hierarchical IdentityBased Signatures
384
VerifierKeyFlexible Universal DesignatedVerifier Signatures
403
Author Index
422
Copyright

Other editions - View all

Common terms and phrases