Cryptography and Coding

10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings

Editors:

ISBN: 978-3-540-30276-6 (Print) 978-3-540-32418-8 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Papers

    1. No Access

      Book Chapter

      Pages 1-12

      Abstract Models of Computation in Cryptography

    2. No Access

      Book Chapter

      Pages 13-36

      Pairing-Based Cryptography at High Security Levels

    3. No Access

      Book Chapter

      Pages 37-46

      Improved Decoding of Interleaved AG Codes

  3. Coding Theory

    1. No Access

      Book Chapter

      Pages 47-58

      Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics

    2. No Access

      Book Chapter

      Pages 59-67

      A Trellis-Based Bound on (2,1)-Separating Codes

    3. No Access

      Book Chapter

      Pages 68-77

      Tessellation Based Multiple Description Coding

    4. No Access

      Book Chapter

      Pages 78-95

      Exploiting Coding Theory for Collision Attacks on SHA-1

  4. Signatures and Signcryption

    1. No Access

      Book Chapter

      Pages 96-115

      Hash Based Digital Signature Schemes

    2. No Access

      Book Chapter

      Pages 116-135

      A General Construction for Simultaneous Signing and Encrypting

    3. No Access

      Book Chapter

      Pages 136-154

      Non-interactive Designated Verifier Proofs and Undeniable Signatures

  5. Symmetric Cryptography

    1. No Access

      Book Chapter

      Pages 155-167

      Partial Key Recovery Attacks on XCBC, TMAC and OMAC

    2. No Access

      Book Chapter

      Pages 168-185

      Domain Expansion of MACs: Alternative Uses of the FIL-MAC

    3. No Access

      Book Chapter

      Pages 186-200

      Normality of Vectorial Functions

    4. No Access

      Book Chapter

      Pages 201-219

      Related-Key Differential Attacks on Cobra-H64 and Cobra-H128

  6. Side Channels

    1. No Access

      Book Chapter

      Pages 220-232

      The Physically Observable Security of Signature Schemes

    2. No Access

      Book Chapter

      Pages 233-247

      On the Automatic Construction of Indistinguishable Operations

    3. No Access

      Book Chapter

      Pages 248-261

      Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods

  7. Algebraic Cryptanalysis

    1. No Access

      Book Chapter

      Pages 262-277

      Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem

    2. No Access

      Book Chapter

      Pages 278-289

      An Algebraic Framework for Cipher Embeddings

    3. No Access

      Book Chapter

      Pages 290-303

      Probabilistic Algebraic Attacks

previous Page of 2