Elliptic Curve Enhancements |
Modifications of ECDSA / John Malone-Lee ; Nigel P. Smart |
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves / Dongryeol Kim ; Seongan Lim |
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves / Francesco Sica ; Mathieu Ciet ; Jean-Jacques Quisquater |
Snow |
Guess-and-Determine Attacks on SNOW / Philip Hawkes ; Gregory G. Rose |
A New Version of the Stream Cipher SNOW / Patrik Ekdahl ; Thomas Johansson |
Encryption Schemes |
Encryption-Scheme Security in the Presence of Key-Dependent Messages / John Black ; Phillip Rogaway ; Thomas Shrimpton |
On the Security of CTR + CBC-MAC / Jakob Jonsson |
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing / Soichi Furuya ; Kouichi Sakurai |
Differential Attacks |
Markov Truncated Differential Cryptanalysis of Skipjack / Ben Reichardt ; David Wagner |
Higher Order Differential Attack of Camellia(II) / Yasuo Hatano ; Hiroki Sekine ; Toshinobu Kaneko |
Square-like Attacks on Reduced Rounds of IDEA / Huseyin Demirci |
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98 / Donghoon Chang ; Jaechul Sung ; Soohak Sung ; Sangjin Lee ; Jongin Lim |
Boolean Functions and Stream Ciphers |
On Propagation Characteristics of Resilient Functions / Pascale Charpin ; Enes Pasalic |
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q) / Paul Camion ; Miodrag J. Mihaljevic ; Hideki Imai |
Multiples of Primitive Polynomials and Their Products over GF(2) / Subhamoy Maitra ; Kishan Chand Gupta ; Ayineedi Venkateswarlu |
A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function / Sabine Leveiller ; Gilles Zemor ; Philippe Guillot ; Joseph Boutros |
Block Cipher Security |
White-Box Cryptography and an AES Implementation / Stanley Chow ; Philip Eisen ; Harold Johnson ; Paul C. Van Oorschot |
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive / Sarvar Patel ; Zulfikar Ramzan ; Ganapathy S. Sundaram |
Signatures and Secret Sharing |
New Results on Unconditionally Secure Distributed Oblivious Transfer / Carlo Blundo ; Paolo D'Arco ; Alfredo De Santis ; Douglas R. Stinson |
Efficient Identity Based Signature Schemes Based on Pairings / Florian Hess |
The Group Diffie-Hellman Problems / Emmanuel Bresson ; Olivier Chevassut ; David Pointcheval |
MAC and Hash Constructions |
Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model / Shoichi Hirose |
An Efficient MAC for Short Messages |
RSA and XTR Enhancements |
Optimal Extension Fields for XTR / Dong-Guk Han ; Ki Soon Yoon ; Young-Ho Park ; Chang Han Kim |
On Some Attacks on Multi-prime RSA / M. Jason Hinek ; Mo King Low ; Edlyn Teske |
Author Index |
Elliptic Curve Enhancements |
Modifications of ECDSA / John Malone-Lee ; Nigel P. Smart |
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves / Dongryeol Kim ; Seongan Lim |
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves / Francesco Sica ; Mathieu Ciet ; Jean-Jacques Quisquater |
Snow |
Guess-and-Determine Attacks on SNOW / Philip Hawkes ; Gregory G. Rose |