Skip to main content
  • Conference proceedings
  • © 2006

Progress in Cryptology - INDOCRYPT 2006

7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4329)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): INDOCRYPT: International Conference on Cryptology in India

Conference proceedings info: INDOCRYPT 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

  2. Invited Talk

    1. Whither Cryptography?

      • James L. Massey
      Pages 1-1
  3. Symmetric Cryptography: Attacks

    1. Non-randomness in eSTREAM Candidates Salsa20 and TSC-4

      • Simon Fischer, Willi Meier, Côme Berbain, Jean-François Biasse, M. J. B. Robshaw
      Pages 2-16
    2. Differential and Rectangle Attacks on Reduced-Round SHACAL-1

      • Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman
      Pages 17-31
    3. Algebraic Attacks on Clock-Controlled Cascade Ciphers

      • Kenneth Koon-Ho Wong, Bernard Colbert, Lynn Batten, Sultan Al-Hinai
      Pages 32-47
    4. An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication

      • Marc P. C. Fossorier, Miodrag J. Mihaljević, Hideki Imai, Yang Cui, Kanta Matsuura
      Pages 48-62
  4. Hash Functions

    1. Update on Tiger

      • Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe
      Pages 63-79
    2. RC4-Hash: A New Hash Function Based on RC4

      • Donghoon Chang, Kishan Chand Gupta, Mridul Nandi
      Pages 80-94
    3. Security of VSH in the Real World

      • Markku-Juhani O. Saarinen
      Pages 95-103
  5. Invited Talk

    1. Another Look at “Provable Security”. II

      • Neal Koblitz, Alfred Menezes
      Pages 148-175
  6. Provable Security: Public Key Cryptography

    1. Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions

      • Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
      Pages 176-190
    2. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

      • Isamu Teranishi, Takuro Oyama, Wakaha Ogata
      Pages 191-205
    3. Conditionally Verifiable Signature

      • Ian F. Blake, Aldar C-F. Chan
      Pages 206-220
    4. Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission

      • Arpita Patra, Ashish Choudhary, K. Srinathan, C. Pandu Rangan
      Pages 221-235
  7. Symmetric Cryptography: Design

    1. Enciphering with Arbitrary Small Finite Domains

      • Valery Pryamikov
      Pages 251-265
    2. Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240

      • Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yücel
      Pages 266-279

Other Volumes

  1. Progress in Cryptology - INDOCRYPT 2006

Editors and Affiliations

  • Indian Statistical Institute, Kolkata, India

    Rana Barua

  • Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, Eindhoven, Netherlands

    Tanja Lange

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access