Atjaunināt sīkdatņu piekrišanu

Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings 2009 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 443 pages, height x width: 235x155 mm, weight: 700 g, XV, 443 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 5922
  • Izdošanas datums: 24-Nov-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642106277
  • ISBN-13: 9783642106279
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 443 pages, height x width: 235x155 mm, weight: 700 g, XV, 443 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 5922
  • Izdošanas datums: 24-Nov-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642106277
  • ISBN-13: 9783642106279
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.



The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.
Post-Quantum Cryptology
Secure Parameters for Swifft
1(17)
Johannes Buchmann
Richard Lindner
FSBday: Implementing Wagner's Generalized Birthday Attack against the SHA-3 Round-1 Candidate FSB
18(21)
Daniel J. Bernstein
Tanja Lange
Ruben Niderhagen
Christiane Peters
Peter Schwabe
Key Agreement Protocols
Reusing Static Keys in Key Agreement Protocols
39(18)
Sanjit Chatterjee
Alfred Menezes
Berkant Ustaoglu
A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
57(15)
Collen Swanson
David Jao
Side Channel Attacks
Fault Analysis of Rabbit: Toward a Secret Key Leakage
72(16)
Alexandre Berzati
Cecile Canovas-Dumas
Louis Goubin
On Physical Obfuscation of Cryptographic Algorithms
88(16)
Julien Bringer
Herve Chabanne
Thomas Icart
Cache Timing Attacks on Clefia
104(15)
Chester Rebeiro
Debdeep Mukhopadhyay
Junko Takahashi
Toshinori Fukunaga
Symmetric Cryptology
Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode
119(17)
Thierry P. Berger
Marine Minier
Benjamin Pousse
On the Symmetric Negabent Boolean Functions
136(8)
Sumanta Sarkar
Improved Meet-in-the-Middle Attacks on AES
144(13)
Huseyin Demirci
Ihsan Taskin
Mustafa Coban
Adnan Baysal
Hash Functions
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode
157(12)
Orr Dunkelman
Ewan Fleischmann
Michael Gorski
Stefan Lucks
Second Preimage Attack on SHAMATA-512
169(13)
Kota Ideguchi
Dai Watanabe
Towards Secure and Practical MACs for Body Sensor Networks
182(17)
Zheng Gong
Pieter Hartel
Svetla Nikova
Bo Zhu
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions
199(20)
Rishiraj Bhattacharyya
Avradip Mandal
Mridual Nandi
A Distinguisher for the Compression Function of SIMD-512
219(14)
Florian Mendel
Tomislav Nad
Number Theoretic Cryptology
Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree
233(15)
Mahabir Prasad Jhanwar
Rana Barua
Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller
248(15)
Conrado Porto Lopes Gouvea
Julio Lopez
A New Hard-Core Predicate of Paillier's Trapdoor Function
263(9)
Dong Su
Kewei Lv
Lightweight Cryptology
Private Interrogation of Devices via Identification Codes
272(18)
Julien Bringer
Herve Chabanne
Gerard Cohen
Bruno Kindarji
RFID Distance Bounding Multistate Enhancement
290(18)
Gildas Avoine
Christian Floerkemeier
Benjamin Martin
Two Attacks against the Ff RFID Protocol
308(13)
Olivier Billet
Kaoutar Elkhiyaoui
Signature Protocols
Efficient Constructions of Signcryption Schemes and Signcryption Composability
321(22)
Takahiro Matsuda
Kanta Matsuura
Jacob C.N. Schuldt
On Generic Constructions of Designated Confirmer Signatures: The ``Encryption of a Signature'' Paradigm Revisited
343(20)
Laila El Aimani
Verifiably Encrypted Signatures from RSA without NIZKs
363(15)
Markus Ruckert
Identity Based Aggregate Signcryption Schemes
378(20)
S. Sharmila Deva Selvi
S. Sree Vivek
J. Shriram
S. Kalaivani
C. Pandu Rangan
Multiparty Computation
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience
398(20)
Arpita Patra
Ashish Choudhary
C. Pandu Rangan
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems
418(12)
Huafei Zhu
Feng Bao
Oblivious Multi-variate Polynomial Evaluation
430(13)
Gerald Gavin
Marine Minier
Author Index 443