Advances in Cryptology – CRYPTO 2004: 24th Annual by Alex Biryukov, Christophe De Cannière, Michaël Quisquater

By Alex Biryukov, Christophe De Cannière, Michaël Quisquater (auth.), Matt Franklin (eds.)

Crypto 2004, the twenty fourth Annual Crypto convention, used to be subsidized by way of the Int- nationwide organization for Cryptologic learn (IACR) in cooperation with the IEEE desktop Society Technical Committee on defense and privateness and the pc technology division of the collage of California at Santa Barbara. this system committee accredited 33 papers for presentation on the conf- ence. those have been chosen from a complete of 211 submissions. each one paper got a minimum of 3 self reliant experiences. the choice technique incorporated a web based dialogue part, and a one-day application committee assembly at long island U- versity. those lawsuits contain up to date models of the 33 authorized papers. The authors had a number of weeks to revise them, aided through reviews from the reviewers. besides the fact that, the revisions weren't subjected to any editorial evaluation. Theconferenceprogramincludedtwoinvitedlectures.VictorShoup’sinvited speak was once a survey on selected ciphertext protection in public-key encryption. Susan Landau’s invited speak was once entitled “Security, Liberty, and digital Commu- cations”. Her prolonged summary is incorporated in those court cases. We endured the culture of a Rump consultation, chaired through Stuart Haber. these shows (always brief, frequently severe) aren't incorporated here.

Show description

Read Online or Download Advances in Cryptology – CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings PDF

Similar international conferences and symposiums books

Information Processing in Medical Imaging: 18th International Conference, IPMI 2003, Ambleside, UK, July 20-25, 2003. Proceedings

IPMI occupies a massive place within the scienti? c calendar. each years, it brings jointly top researchers in scientific snapshot formation, research and interpretation, for a global workshop that permits huge, in-depth d- cussion of latest principles. some of the so much in? uential advancements within the ?

Information Security and Cryptology — ICISC 2002: 5th International Conference Seoul, Korea, November 28–29, 2002 Revised Papers

This publication constitutes the completely refereed post-proceedings of the fifth overseas convention on info protection and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised complete papers awarded including an invited paper have been rigorously chosen from 142 submissions in the course of rounds of reviewing and development.

Geographic Information Science: 4th International Conference, GIScience 2006, Münster, Germany, September 20-23, 2006. Proceedings

The GIScience convention sequence (www. giscience. org) used to be created as a discussion board for all researchers who're drawn to advancing learn within the fundam- tal features of geographic details technological know-how. beginning with GIScience 2000 in Savannah, Georgia, united states, the meetings were held biennially, bringing jointly a hugely interdisciplinary crew of scientists from academia, undefined, and governmentto learn progressand to discover new researchdirections.

Secure Mobile Ad-hoc Networks and Sensors: First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers

This booklet constitutes the completely refereed post-proceedings of the 1st overseas Workshop on safe cellular Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005. The 12 revised complete papers awarded including five keynote papers and 1 invited paper have been rigorously reviewed and chosen from a complete of 33 submissions.

Extra info for Advances in Cryptology – CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings

Sample text

The gain is small, since Matsui’s attack gains the first round rather efficiently as well. A more detailed overview of the history of linear cryptanalysis can be found in the extended version of this paper [1]. TEAM LinG Feistel Schemes and Bi-linear Cryptanalysis (Extended Abstract) Nicolas T. org Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased characteristics that combine for an arbitrary number of rounds.

17, n. 2, pp. 373-386, April 1988. 25. M. Matsui: Linear Cryptanalysis Method for DES Cipher, Eurocrypt’93, LNCS 765, Springer, pp. 386-397, 1993. 26. M. Matsui, On correlation between the order of S-boxes and the strength of DES, Eurocrypt’94, LNCS 950, pp. 366-375, Springer, 1995. 27. Matsui: The First Experimental Cryptanalysis of the Data Encryption Standard, Crypto’94, LNCS 839, Springer, pp. 1-11, 1994. 28. Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: Handbook of Applied Cryptography; CRC Press, 1996.

2. 2 Application to the Next (Even) Round The same method can be applied to the next, even, round of a Feistel scheme, with the only difference that the round function is connected in the inverse direction. In this case, to obtain a characteristic true with probability we need to have a bias in the function: Fig. 3. 3 Combining Approximations to Get a Bi-linear Attack for an Arbitrary Number of Rounds It is obvious that such I/O sums as specified above can be combined for an arbitrary number of rounds (contradicting [20] page 226).

Download PDF sample

Rated 4.82 of 5 – based on 18 votes