Vorwort und Inhaltsverzeichnis

Transcription

Vorwort und Inhaltsverzeichnis
Christopher Wolf, Stefan Lucks, Po-Wah Yau (Eds.)
WEWoRC 2005
Western European Workshop on Research in Cryptology
July 5–7, 2005
in Leuven, Belgium
Gesellschaft für Informatik 2005
Lecture Notes in Informatics (LNI) - Proceedings
Series of the Gesellschaft für Informatik (GI)
Volume P-74
ISBN 3-88579-403-9
ISSN 1617-5468
Volume Editors
Christopher Wolf
ESAT-COSIC, K.U. Leuven, Kasteelpark Arenberg 10
B-3001 Leuven-Heverlee, Belgium
E-Mail: [email protected]
[email protected]
Stefan Lucks
Lehrstuhl für Theoretische Informatik, Universität Mannheim
D-68131 Mannheim, Germany
E-Mail: [email protected]
Po-Wah Yau
Information Security Group, Royal Holloway, University of London
Egham, Surrey TW20 0EX, UK
E-Mail: [email protected]
Series Editorial Board
Heinrich C. Mayr, Universität Klagenfurt, Austria (Chairman, [email protected])
Jörg Becker, Universität Münster, Germany
Ulrich Furbach, Universität Koblenz, Germany
Axel Lehmann, Universität der Bundeswehr München, Germany
Peter Liggesmeyer, TU Kaiserslautern und Frauenhofer IESE, Germany
Ernst W. Mayr, Technische Universität München, Germany
Heinrich Müller, Universität Dortmund, Germany
Heinrich Reinermann, Hochschule für Verwaltungswissenschaften Speyer, Germany
Karl-Heinz Rödiger, Universität Bremen, Germany
Sigrid Schubert, Universität Siegen, Germany
Dissertations
Dorothea Wagner, Universität Karlsruhe, Germany
Seminars
Reinhard Wilhelm, Universität des Saarlandes, Germany
c Gesellschaft für Informatik, Bonn 2005
°
printed by Köllen Druck+Verlag GmbH, Bonn
Foreword
The Western European Workshop on Research in Cryptology (WEWoRC 2005) was the
first of its kind. It was organised as a joint venture between the Katholieke Universiteit
Leuven (K.U.Leuven), research group on Computer Security and Industrial Cryptography
(COSIC), Royal Holloway, University of London, Information Security Group (ISG), and
the Special Interest Group on Cryptology (FG Krypto) in the German Computer Science
Society (Gesellschaft für Informatik e.V.). The aim was to bring together researchers in the
field of cryptology. The workshop focused on research from Masters and Ph.D. students,
and brought them together with more experienced senior researchers.
WEWoRC was held in the mediaeval town of Leuven, from July 5–7, 2005. Leuven has
a rich academic tradition and an equally enjoyable student life. Hence, it provided the
perfect scenery for hosting this event. In total, we had 91 participants from 14 different
countries (Austria, Belgium, Canada, Denmark, France, Germany, Ireland, Italy, Japan,
the Netherlands, Serbia and Montenegro, Spain, UK, USA).
In total, we received 52 submissions of which 49 where chosen for presenting in 15 sessions. Out of these 49 talks, 26 were selected for submission to these post-proceedings.
The authors of two papers decided to merge their papers into one, so the programme committee had to review a total of 25 papers. Each paper was reviewed in a careful refereeing
process by at least 3 experts in its area; we used a total of 87 reviews for selecting the 12
papers presented here.
We are very grateful to all the programme committee member who devoted much effort
and valuable time to reading and selecting the papers. These post-proceedings contain the
final versions of each paper revised after the conference. Since the revised versions were
not checked by the programme committee members rigorously, the authors must bear full
responsibility for the contents of their papers. We also want to thank the external experts
who assisted the programme committee in evaluating various papers.
Special thanks to our sponsors who made it possible to offer WEWoRC for a competitive
price. You find their logos on the first page of these post-proceedings. We are in particular debt of the Horst Görtz Stiftung. Moreover, we want to thank DICE (UCL, Belgium)
and the “Graduiertenkolleg für Mathematik" (Essen, Germany) for allowing us to support
students who could not afford the travel costs and enrolment fees. Similarly, we want to
mention the cooperation with EIDMA. In addition, we want to thank the local organising
committee for their skillful, professional, and enthusiastic support of WEWoRC. Keep in
mind that all work was done voluntarily. Special thanks go in this context to Bart Preneel who kindly agreed that the workshop could be hosted by COSIC and that we were
allowed to use the COSIC infrastructure (both technical and administrative) for WEWoRC.
Finally, we would like to thank all authors — including those whose submissions were not
successful, as well as the workshop participants from around the world for their support,
which made WEWoRC a big success.
November 2005
Christopher Wolf
Leuven
iii
Stefan Lucks
Mannheim
Po-Wah Yau
London
Gold Sponsors
Horst Görtz Stiftung
Silver Sponsors
Bronze Sponsors
Programme Committee
Frederik Armknecht
Roberto Avanzi
Lejla Batina
Lynn Batten
Alex Biryukov
Colin Boyd
An Braeken
Johannes Buchmann
Anne Canteaut
Dario Catalano
Jean-Sebastien Coron
Ronald Cramer
Serge Fehr
Gerhard Frey
Steven Galbraith
Marc Girault
Louis Goubin
Ulrich Kühn
Tanja Lange
Joseph Lano
Gregor Leander
Arjen Lenstra
Franck Leprévost
Stefan Lucks
Keith Martin
Chris Mitchell
Kaisa Nyberg
Siddika Berna Ors
Elisabeth Oswald
Christof Paar
Kenny Paterson
Bart Preneel
Jean-Jacques Quisquater
Vincent Rijmen
Rei Safavi-Naini
Nicolas Sendrier
Stefaan Seys
Igor Shparlinski
François-Xavier Standaert
Henk van Tilborg
Ingrid Verbauwhede
Ralf-Philipp Weinmann
Christopher Wolf
Po-Wah Yau
Erik Zenner
University of Mannheim, Germany
Ruhr Universität Bochum, Germany
Katholieke Universiteit Leuven, Belgium
Deakin University, Australia
Katholieke Universiteit Leuven, Belgium
Queensland University of Technology, Australia
K.U. Leuven, Belgium
TU Darmstadt, Germany
INRIA, France
ENS, France
University of Luxembourg, Luxembourg
CWI & Leiden University, The Netherlands
CWI, The Netherlands
University of Duisburg-Essen, Germany
Royal Holloway, University of London, UK
France Telecom, France
University of Versailles, France
Deutsche Telekom Laboratories, Germany
Technical University of Denmark, Denmark
Katholieke Universiteit Leuven, Belgium
Ruhr Universität Bochum, Germany
Lucent, USA; TU Eindhoven, The Netherlands
University of Luxembourg, Luxembourg
University of Mannheim, Germany
Royal Holloway, University of London, UK
Royal Holloway, University of London, UK
Helsinki University of Technology and Nokia, Finland
Istanbul Technical University, Turkey
TU Graz, Austria
Ruhr Universität Bochum, Germany
Royal Holloway, University of London, UK
Katholieke Universiteit Leuven, Belgium
UC Louvain, Belgium
TU Graz, Austria; Cryptomathic, Denmark
University of Wollongong, Australia
INRIA, France
Katholieke Universiteit Leuven, Belgium
Macquarie University, Australia
UC Louvain, Belgium
TU Eindhoven, The Netherlands
Katholieke Universiteit Leuven, Belgium; UCLA, USA
TU Darmstadt, Germany
Katholieke Universiteit Leuven, Belgium
Royal Holloway, University of London, UK
Cryptico, Denmark
vii
External Reviewers
Scott Contin, Özgül Küçük, Wnming Lu, Angela Piper, Dries Schellekens, Jasper Scholten,
Dirk Stegemann, İslam Tatlı, Frederik Vercauteren
Local Organising Committee (COSIC, K.U. Leuven)
General Organisation
An Braeken
Elke De Mulder
Dries Schellekens
Jasper Scholten
Joe Lano
Brecht Wyseur
Thomas Herlea
Housing, Food
Webdesign, Registration
Webhosting, Social Programme, Technical Support
Connectivity, Post-Proceedings
Technical Support
Social Programme, Conference Records
Submission System, Conference Records
Administrative support
Péla Noë
Accounting support
Elvira Wouters
Conference Record
The conference record with the abstracts of all talks can be found at
http://www.cosic.esat.kuleuven.be/publications/article-585.pdf
http://www.gi-ev.de/fachbereiche/sicherheit/fg/krypto/downloads/
WEWoRC2005ConferenceRecords.pdf.
viii
Contents
Efficient Electronic Gambling: An Extended Implementation of the
Toolbox for Mental Card Games
Heiko Stamer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1
Algebraic Attacks and Annihilators
Frederik Armknecht . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13
A Secure Network Storage System with Information Privacy
SeongHan Shin, Kazukuni Kobara and Hideki Imai . . . . . . . . . . . .
22
A cryptosystem " à la " ElGamal on an elliptic curve over Fp [ε]
Marie Virat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
32
A Scanning Tool for PC Root Public Key Stores
Adil Alsaid and Chris J. Mitchell . . . . . . . . . . . . . . . . . . . . . .
45
State Recovery Attacks on Pseudorandom Generators
Andrey Sidorenko and Berry Schoenmakers . . . . . . . . . . . . . . . .
53
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds
Jaechul Sung, Jongsung Kim, Changhoon Lee and Seokhie Hong . . . . .
64
Collision attacks on processors with cache and countermeasures
Cédric Lauradoux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
76
Applications of Partial Hiding in RSA
Eabhnat Ní Fhloinn and Michael Purser . . . . . . . . . . . . . . . . . .
86
Publicly Verifiable Secret Sharing from Paillier’s Cryptosystem
Alexandre Ruiz and Jorge L. Villar . . . . . . . . . . . . . . . . . . . . .
98
Issues on Designing a Cryptographic Compiler
Stefan Lucks, Nico Schmoigl, Emin İslam Tatlı . . . . . . . . . . . . . . . 109
Analysis of simplified variants of SHA-256
Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
ix

Similar documents