Invited Talks |
Linear Complexity and Related Complexity Measures for Sequences / H. Niederreiter |
Forensic Computing / X. Li ; J. Seberry |
Stream Cipher |
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation / P. Sarkar |
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator / S. Paul ; B. Preneel |
Block Cipher |
Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA / H.M. Yildirim |
Impossible Differential Cryptanalysis for Block Cipher Structures / J. Kim ; S. Hong ; J. Sung ; S. Lee ; J. Lim ; S. Sung |
Impossible Differential Attack on 30-Round SHACAL-2 / G. Kim ; C. Lee |
Boolean Function |
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria / K.C. Gupta |
Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria / S. Kavut ; M.D. Yücel |
Secrect Sharing |
On Multiplicative Linear Secret Sharing Schemes / V. Nikov ; S. Nikova |
A New (2,n)-Visual Threshold Scheme for Color Images / A. Adhikari ; S. Sikdar |
On the Power of Computational Secret Sharing / V. Vinod ; A. Narayanan ; K. Srinathan ; C.P. Rangan ; K. Kim |
Bilinear Pairing |
Identity-Based Broadcasting / Y. Mu ; W. Susilo ; Y.-X. Lin |
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings / F. Zhang ; R. Safavi-Naini |
Extending Joux's Protocol to Multi Party Key Agreement / R. Barua ; R. Dutta |
Public Key |
Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups / P.J. Abisha ; D.G. Thomas ; K.G. Subramanian |
Prime Numbers of Diffie-Hellman Groups for IKE-MODP / I. Yie ; S. Lim ; S. Kim ; D. Kim |
Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems / F. Levy-dit-Vehel ; L. Perret |
Signature Scheme |
Security Analysis of Several Group Signature Schemes / G. Wang |
Forking Lemmas for Ring Signature Schemes / J. Herranz ; G. Saez |
Protocol |
Practical Mental Poker Without a TTP Based on Homomorphic Encryption / J. Castellà-Roca ; J. Domingo-Ferrer ; A. Riera ; J. Borrell |
Lightweight Mobile Credit-Card Payment Protocol / S. Kungpisdan ; B. Srinivasan ; P.D. Le |
Elliptic Curve & Algebraic Geometry |
On the Construction of Prime Order Elliptic Curves / E. Konstantinou ; Y.C. Stamatiou ; C. Zaroliagis |
Counting Points on an Abelian Variety over a Finite Field / F.A. Izadi ; V.K. Murty |
Implementation & Digital Watermarking |
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication / K. Okeya ; D.-G. Han |
Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(pm) / G. Bertoni ; J. Guajardo ; G. Orlando |
Cryptanalysis of Block Based Spatial Domain Watermarking Schemes / T.K. Das |
Authentication |
More Efficient Password Authenticated Key Exchange Based on RSA / D.S. Wong ; A.H. Chan ; F. Zhu |
A Password-Based Authenticator: Security Proof and Applications / Y. Hitchcock ; Y.S.T. Tin ; J.M. Gonzalez-Nieto ; C. Boyd ; P. Montague |
Stronger Security Bounds for OMAC, TMAC, and XCBC / T. Iwata ; K. Kurosawa |
Progressive Verification: The Case of Message Authentication / M. Fischlin |
Author Index |
Invited Talks |
Linear Complexity and Related Complexity Measures for Sequences / H. Niederreiter |
Forensic Computing / X. Li ; J. Seberry |
Stream Cipher |
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation / P. Sarkar |
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator / S. Paul ; B. Preneel |