


default search action
1. Mycrypt 2005: Kuala Lumpur, Malaysia
- Ed Dawson, Serge Vaudenay:

Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings. Lecture Notes in Computer Science 3715, Springer 2005, ISBN 3-540-28938-0
Invited Talk I
- Hideki Imai:

Trends and Challenges for Securer Cryptography in Practice. 1
Stream Ciphers Analysis
- Simon Künzli, Pascal Junod

, Willi Meier:
Distinguishing Attacks on T-Functions. 2-15 - Frederik Armknecht

, Gwénolé Ars:
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. 16-32
Cryptography Based on Combinatorics
- Christopher Wolf, Bart Preneel:

Equivalent Keys in HFE, C*, and Variations. 33-49 - Raphael Overbeck:

A New Structural Attack for GPT and Variants. 50-63 - Daniel Augot, Matthieu Finiasz, Nicolas Sendrier:

A Family of Fast Syndrome Based Cryptographic Hash Functions. 64-83
Cryptographic Protocols
- Kun Peng, Colin Boyd, Ed Dawson:

Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. 84-98 - Sherman S. M. Chow

, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Delegation Network. 99-115 - Kim-Kwang Raymond Choo

, Colin Boyd, Yvonne Hitchcock:
On Session Key Construction in Provably-Secure Key Establishment Protocols. 116-131 - Yuichi Komano

, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
:
On the Security of Probabilistic Multisignature Schemes and Their Optimality. 132-150
Invited Talk II
- Aggelos Kiayias, Moti Yung:

Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. 151-170
Implementation Issues
- Mathieu Ciet, Francesco Sica

:
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. 171-182 - Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha:

Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. 183-195 - Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay:

Optimization of the MOVA Undeniable Signature Scheme. 196-209
Unconventional Cryptography
- Adam L. Young, Moti Yung:

Questionable Encryption and Its Applications. 210-221 - Arjen K. Lenstra, Benjamin M. M. de Weger:

Twin RSA. 222-228
Invited Talk III
- Colin Boyd, Kim-Kwang Raymond Choo

:
Security of Two-Party Identity-Based Key Agreement. 229-243
Block Cipher Cryptanalysis
- Changhoon Lee

, Jongsung Kim, Seokhie Hong, Jaechul Sung
, Sangjin Lee:
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. 244-262 - Raphael Chung-Wei Phan

:
Advanced Slide Attacks Revisited: Realigning Slide on DES. 263-276 - Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan

:
New Multiset Attacks on Rijndael with Large Blocks. 277-295
Homomorphic Encryption
- Katja Schmidt-Samoa, Tsuyoshi Takagi:

Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. 296-313 - Kristian Gjøsteen:

Homomorphic Cryptosystems Based on Subgroup Membership Problems. 314-327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














