Skip to main content
  • Conference proceedings
  • © 2007

Progress in Cryptology – INDOCRYPT 2007

8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4859)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): INDOCRYPT: International Conference on Cryptology in India

Conference proceedings info: INDOCRYPT 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Elliptic Curve

    1. On the Bits of Elliptic Curve Diffie-Hellman Keys

      • David Jao, Dimitar Jetchev, Ramarathnam Venkatesan
      Pages 33-47
  3. Cryptoanalysis

    1. Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses

      • Gautham Sekar, Souradyuti Paul, Bart Preneel
      Pages 58-72
    2. Related-Key Differential-Linear Attacks on Reduced AES-192

      • Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng
      Pages 73-85
    3. Improved Meet-in-the-Middle Attacks on Reduced-Round DES

      • Orr Dunkelman, Gautham Sekar, Bart Preneel
      Pages 86-100
  4. Information Theoretic Security

    1. Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality

      • Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 101-122
    2. Secret Swarm Unit Reactive k −Secret Sharing

      • Shlomi Dolev, Limor Lahiani, Moti Yung
      Pages 123-137
  5. Elliptic Curve Cryptography

    1. New Formulae for Efficient Elliptic Curve Arithmetic

      • Huseyin Hisil, Gary Carter, Ed Dawson
      Pages 138-151
    2. A Graph Theoretic Analysis of Double Base Number Systems

      • Pradeep Kumar Mishra, Vassil Dimitrov
      Pages 152-166
    3. Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication

      • Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
      Pages 167-182
  6. Signature

    1. Transitive Signatures from Braid Groups

      • Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang
      Pages 183-196
    2. Proxy Re-signature Schemes Without Random Oracles

      • Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
      Pages 197-209
  7. Side Channel Attack

    1. First-Order Differential Power Analysis on the Duplication Method

      • Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois
      Pages 210-223
    2. Solving Discrete Logarithms from Partial Knowledge of the Key

      • K. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao
      Pages 224-237
  8. Symmetric Cryptosystem

    1. Tweakable Enciphering Schemes from Hash-Sum-Expansion

      • Kazuhiko Minematsu, Toshiyasu Matsushima
      Pages 252-267

Other Volumes

  1. Progress in Cryptology – INDOCRYPT 2007

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access