Skip to main content
  • Conference proceedings
  • © 2008

Research in Cryptology

Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4945)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WEWoRC: Western European Workshop on Research in Cryptology

Conference proceedings info: WEWoRC 2007.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (12 papers)

  1. Front Matter

  2. A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services

    • Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka, Hideki Imai
    Pages 1-12
  3. The GPS Identification Scheme Using Frobenius Expansions

    • Waldyr D. Benits Jr., Steven D. Galbraith
    Pages 13-27
  4. Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256

    • Marko Hölbl, Christian Rechberger, Tatjana Welzer
    Pages 28-38
  5. Efficient Hash Collision Search Strategies on Special-Purpose Hardware

    • Tim Güneysu, Christof Paar, Sven Schäge
    Pages 39-51
  6. Preimages for Reduced-Round Tiger

    • Sebastiaan Indesteege, Bart Preneel
    Pages 90-99
  7. New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B

    • Gautham Sekar, Souradyuti Paul, Bart Preneel
    Pages 127-141
  8. Back Matter

Other Volumes

  1. Research in Cryptology

About this book

This book constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology, WEWoRC 2007, held in Bochum, Germany, in July 2007 The 12 revised full papers were carefully reviewed and selected from a total of 36 submissions. The papers cover topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, cryptographic protocols, implementation of cryptosystems and their integration into secure systems, secure operating systems and trusted computing, applications such as watermarking and code obfuscation.

Keywords

  • Protection
  • achterbahn-128
  • algebraic attacs
  • complexity
  • cryptanalysis
  • cryptography
  • discrete logarithm
  • frobenius expansion
  • gps
  • hash collision
  • quadratic forms
  • reduced-round tiger
  • sha-256
  • tpy-6

Editors and Affiliations

  • Fakultät Medien, Bauhaus-Universität Weimar, Weimar, Germany

    Stefan Lucks

  • Horst Görtz Institute for IT Security, Ruhr-University of Bochum, Germany

    Ahmad-Reza Sadeghi

  • Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany

    Christopher Wolf

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions