Skip to main content
  • Conference proceedings
  • © 2005

Progress in Cryptology – Mycrypt 2005

First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3715)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Mycrypt: International Conference on Cryptology in Malaysia

Conference proceedings info: Mycrypt 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. Invited Talk I

  3. Stream Ciphers Analysis

    1. Distinguishing Attacks on T-Functions

      • Simon Künzli, Pascal Junod, Willi Meier
      Pages 2-15
  4. Cryptography Based on Combinatorics

    1. Equivalent Keys in HFE, C*, and Variations

      • Christopher Wolf, Bart Preneel
      Pages 33-49
    2. A New Structural Attack for GPT and Variants

      • Raphael Overbeck
      Pages 50-63
    3. A Family of Fast Syndrome Based Cryptographic Hash Functions

      • Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
      Pages 64-83
  5. Cryptographic Protocols

    1. Identity Based Delegation Network

      • Sherman S. M. Chow, Richard W. C. Lui, Lucas C. K. Hui, S. M. Yiu
      Pages 99-115
    2. On Session Key Construction in Provably-Secure Key Establishment Protocols

      • Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
      Pages 116-131
    3. On the Security of Probabilistic Multisignature Schemes and Their Optimality

      • Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shinichi Kawamura
      Pages 132-150
  6. Implementation Issues

    1. Optimization of the MOVA Undeniable Signature Scheme

      • Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay
      Pages 196-209
  7. Unconventional Cryptography

    1. Questionable Encryption and Its Applications

      • Adam Young, Moti Yung
      Pages 210-221
    2. Twin RSA

      • Arjen K. Lenstra, Benjamin M. M. de Weger
      Pages 222-228
  8. Invited Talk III

    1. Security of Two-Party Identity-Based Key Agreement

      • Colin Boyd, Kim-Kwang Raymond Choo
      Pages 229-243
  9. Block Cipher Cryptanalysis

    1. Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b

      • Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee
      Pages 244-262

Other Volumes

  1. Progress in Cryptology – Mycrypt 2005

Editors and Affiliations

  • Information Security Institute, Queensland University of Technology, Brisbane, Australia

    Ed Dawson

  • EPFL, Lausanne, Switzerland

    Serge Vaudenay

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access