Progress in cryptology -- INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. (Q2488058)

From MaRDI portal





scientific article
Language Label Description Also known as
English
Progress in cryptology -- INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004.
scientific article

    Statements

    Progress in cryptology -- INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. (English)
    0 references
    23 August 2005
    0 references
    The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1029.00080). Indexed articles: \textit{Boyd, Colin}, Design of secure key establishment protocols: Successes, failures and prospects, 1-13 [Zbl 1113.94306] \textit{Sahai, Amit}, Secure protocols for complex tasks in complex environments, 14-16 [Zbl 1113.94319] \textit{Hitchcock, Yvonne; Boyd, Colin; González Nieto, Juan Manuel}, Tripartite key exchange in the Canetti-Krawczyk proof model, 17-32 [Zbl 1113.94325] \textit{Montreuil, Audrey; Patarin, Jacques}, The marriage proposals problem: fair and efficient solution for two-party computations, 33-47 [Zbl 1115.94013] \textit{Wang, Guilin; Bao, Feng; Zhou, Jianying}, On the security of a certified e-mail scheme, 48-60 [Zbl 1113.94327] \textit{Peng, Kun; Aditya, Riza; Boyd, Colin; Dawson, Ed; Lee, Byoungcheon}, Multiplicative homomorphic e-voting, 61-72 [Zbl 1113.94318] \textit{Zhang, Bin; Wu, Hongjun; Feng, Dengguo; Bao, Feng}, Chosen ciphertext attack on a new class of self-synchronizing stream ciphers, 73-83 [Zbl 1113.94322] \textit{Batten, Lynn Margaret}, Algebraic attacks over \(\text{GF}(q)\), 84-91 [Zbl 1115.94005] \textit{Dalai, Deepak Kumar; Gupta, Kishan Chand; Maitra, Subhamoy}, Results on algebraic immunity for cryptographically significant Boolean functions, 92-106 [Zbl 1115.94007] \textit{Poinsot, Laurent; Harari, Sami}, Generalized Boolean bent functions, 107-119 [Zbl 1115.94010] \textit{Braeken, An; Nikov, Ventzislav; Nikova, Svetla; Preneel, Bart}, On Boolean functions with generalized cryptographic properties, 120-135 [Zbl 1115.94006] \textit{Vora, Poorvi L.}, Information theory and the security of binary data perturbation, 136-147 [Zbl 1113.68391] \textit{McAven, Luke; Safavi-Naini, Reihaneh; Yung, Moti}, Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption, 148-161 [Zbl 1113.94314] \textit{Nakahara Júnior, Jorge}, Faster variants of the MESH block ciphers, 162-174 [Zbl 1113.94316] \textit{Kim, Jongsung; Kim, Guil; Lee, Sangjin; Lim, Jongin; Song, Junghwan}, Related-key attacks on reduced rounds of SHACAL-2, 175-190 [Zbl 1113.94311] \textit{Ko, Youngdai; Lee, Changhoon; Hong, Seokhie; Sung, Jaechul; Lee, Sangjin}, Related-key attacks on DDP based ciphers: CIKS-128 and CIKS-128H, 191-205 [Zbl 1113.94312] \textit{Nakahara Júnior, Jorge; Santana de Freitas, Daniel}, Cryptanalysis of Ake98, 206-217 [Zbl 1113.94317] \textit{Berger, Thierry; Loidreau, Pierre}, Designing an efficient and secure public-key cryptosystem based on reducible rank codes, 218-229 [Zbl 1113.94305] \textit{Sarkar, Palash}, HEAD: Hybrid encryption with delegated decryption capability, 230-244 [Zbl 1113.94320] \textit{Galindo, David; Martín, Sebastià; Takagi, Tsuyoshi; Villar, Jorge L.}, A provably secure elliptic curve scheme with fast encryption, 245-259 [Zbl 1115.94009] \textit{Avoine, Gildas; Monnerat, Jean; Peyrin, Thomas}, Advances in alternative non-adjacent form representations, 260-274 [Zbl 1115.94004] \textit{Levy-dit-Vehel, Françoise; Perret, Ludovic}, Attacks on public key cryptosystems based on free partially commutative monoids and groups, 275-289 [Zbl 1113.94313] \textit{Sato, Hisayoshi; Schepers, Daniel; Takagi, Tsuyoshi}, Exact analysis of Montgomery multiplication, 290-304 [Zbl 1115.94012] \textit{Gopalkrishna Gadiyar, H.; Sangeeta Maini, K. M.; Padma, R.}, Cryptography, connections, cocycles and crystals: a \(p\)-adic exploration of the discrete logarithm problem, 305-314 [Zbl 1115.94008] \textit{Halevi, Shai}, EME*: Extending EME to handle arbitrary-length messages with associated data, 315-327 [Zbl 1113.94310] \textit{Chang, Donghoon; Lee, Wonil; Hong, Seokhie; Sung, Jaechul; Lee, Sangjin; Sung, Soohak}, Impossibility of construction of OWHF and UOWHF from PGV model based on block cipher secure against ACPCA, 328-342 [Zbl 1113.94307] \textit{McGrew, David A.; Viega, John}, The security and performance of the Galois/counter mode (GCM) of operation, 343-355 [Zbl 1113.94315] \textit{Herranz, Javier; Sáez, Germán}, Revisiting fully distributed proxy signature schemes, 356-370 [Zbl 1113.94324] \textit{Chen, Xiaofeng; Zhang, Fangguo; Konidala, Divyan M.; Kim, Kwangjo}, New ID-based threshold signature scheme from bilinear pairings, 371-383 [Zbl 1113.94308] \textit{Tsang, Patrick P.; Wei, Victor K.; Chan, Tony K.; Au, Man Ho; Liu, Joseph K.; Wong, Duncan S.}, Separable linkable threshold ring signatures, 384-398 [Zbl 1113.94326] \textit{Adhikari, Avishek; Dutta, Tridib Kumar; Roy, Bimal}, A new black and white visual cryptographic scheme for general access structures, 399-413 [Zbl 1113.94323] \textit{Fernandez, Marcel; Soriano, Miguel}, Identification algorithms for sequential traitor tracing, 414-429 [Zbl 1113.94309]
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references