default search action
1. Mycrypt 2005: Kuala Lumpur, Malaysia
- Ed Dawson, Serge Vaudenay:
Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings. Lecture Notes in Computer Science 3715, Springer 2005, ISBN 3-540-28938-0
Invited Talk I
- Hideki Imai:
Trends and Challenges for Securer Cryptography in Practice. 1
Stream Ciphers Analysis
- Simon Künzli, Pascal Junod, Willi Meier:
Distinguishing Attacks on T-Functions. 2-15 - Frederik Armknecht, Gwénolé Ars:
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. 16-32
Cryptography Based on Combinatorics
- Christopher Wolf, Bart Preneel:
Equivalent Keys in HFE, C*, and Variations. 33-49 - Raphael Overbeck:
A New Structural Attack for GPT and Variants. 50-63 - Daniel Augot, Matthieu Finiasz, Nicolas Sendrier:
A Family of Fast Syndrome Based Cryptographic Hash Functions. 64-83
Cryptographic Protocols
- Kun Peng, Colin Boyd, Ed Dawson:
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. 84-98 - Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Delegation Network. 99-115 - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
On Session Key Construction in Provably-Secure Key Establishment Protocols. 116-131 - Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura:
On the Security of Probabilistic Multisignature Schemes and Their Optimality. 132-150
Invited Talk II
- Aggelos Kiayias, Moti Yung:
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. 151-170
Implementation Issues
- Mathieu Ciet, Francesco Sica:
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. 171-182 - Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha:
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. 183-195 - Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay:
Optimization of the MOVA Undeniable Signature Scheme. 196-209
Unconventional Cryptography
- Adam L. Young, Moti Yung:
Questionable Encryption and Its Applications. 210-221 - Arjen K. Lenstra, Benjamin M. M. de Weger:
Twin RSA. 222-228
Invited Talk III
- Colin Boyd, Kim-Kwang Raymond Choo:
Security of Two-Party Identity-Based Key Agreement. 229-243
Block Cipher Cryptanalysis
- Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. 244-262 - Raphael Chung-Wei Phan:
Advanced Slide Attacks Revisited: Realigning Slide on DES. 263-276 - Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan:
New Multiset Attacks on Rijndael with Large Blocks. 277-295
Homomorphic Encryption
- Katja Schmidt-Samoa, Tsuyoshi Takagi:
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. 296-313 - Kristian Gjøsteen:
Homomorphic Cryptosystems Based on Subgroup Membership Problems. 314-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.