Progress in Cryptology - INDOCRYPT 2004

5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings

  • Anne Canteaut
  • Kapaleeswaran Viswanathan

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3348)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Cryptographic Protocols

    1. Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
      Pages 17-32
  4. Applications

    1. Guilin Wang, Feng Bao, Jianying Zhou
      Pages 48-60
    2. Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
      Pages 61-72
  5. Stream Ciphers

    1. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
      Pages 73-83
    2. Lynn Margaret Batten
      Pages 84-91
  6. Cryptographic Boolean Functions

    1. Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
      Pages 92-106
    2. Laurent Poinsot, Sami Harari
      Pages 107-119
    3. An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
      Pages 120-135
  7. Foundations

  8. Block Ciphers

    1. Jorge Nakahara Júnior
      Pages 162-174
    2. Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Junghwan Song
      Pages 175-190
    3. Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee
      Pages 191-205
    4. Jorge Nakahara Júnior, Daniel Santana de Freitas
      Pages 206-217
  9. Public Key Encryption

About these proceedings


The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this series is increasing every year. The number of papers submitted to INDOCRYPT 2004 was 181, out of which 147 papers conformed to the speci?cations in the call for papers and, therefore, were accepted to the review process. Those 147 submissions were spread over 22 countries. Only 30 papers were accepted to this proceedings. We should note that many of the papers that were not accepted were of good quality but only the top 30 papers were accepted. Each submission received at least three independent - views. The selection process also included a Web-based discussion phase. We made e?orts to compare the submissions with other ongoing conferences around the world in order to ensure detection of double-submissions, which were not - lowed by the call for papers. We wish to acknowledge the use of the Web-based review software developed by Bart Preneel, Wim Moreau, and Joris Claessens in conducting the review process electronically. The software greatly facilitated the Program Committee in completing the review process on time. We would like to thank C´ edric Lauradoux and the team at INRIA for their total support in c- ?guring and managing the Web-based submission and review softwares. We are unable to imagine the outcome of the review process without their participation. This year the invited talks were presented by Prof. Colin Boyd and Prof.


Boolean function authentication cryptanalysis cryptographic protocols cryptography cryptology cryptosystems data security didgital signature schemes information security privacy public key cryptography secure communications systems security

Editors and affiliations

  • Anne Canteaut
    • 1
  • Kapaleeswaran Viswanathan
    • 2
  1. 1.INRIA RocquencourtFrance
  2. 2.SETSChennaiIndia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-24130-0
  • Online ISBN 978-3-540-30556-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book