Vorwort und Inhaltsverzeichnis
Transcription
Vorwort und Inhaltsverzeichnis
Christopher Wolf, Stefan Lucks, Po-Wah Yau (Eds.) WEWoRC 2005 Western European Workshop on Research in Cryptology July 5–7, 2005 in Leuven, Belgium Gesellschaft für Informatik 2005 Lecture Notes in Informatics (LNI) - Proceedings Series of the Gesellschaft für Informatik (GI) Volume P-74 ISBN 3-88579-403-9 ISSN 1617-5468 Volume Editors Christopher Wolf ESAT-COSIC, K.U. Leuven, Kasteelpark Arenberg 10 B-3001 Leuven-Heverlee, Belgium E-Mail: [email protected] [email protected] Stefan Lucks Lehrstuhl für Theoretische Informatik, Universität Mannheim D-68131 Mannheim, Germany E-Mail: [email protected] Po-Wah Yau Information Security Group, Royal Holloway, University of London Egham, Surrey TW20 0EX, UK E-Mail: [email protected] Series Editorial Board Heinrich C. Mayr, Universität Klagenfurt, Austria (Chairman, [email protected]) Jörg Becker, Universität Münster, Germany Ulrich Furbach, Universität Koblenz, Germany Axel Lehmann, Universität der Bundeswehr München, Germany Peter Liggesmeyer, TU Kaiserslautern und Frauenhofer IESE, Germany Ernst W. Mayr, Technische Universität München, Germany Heinrich Müller, Universität Dortmund, Germany Heinrich Reinermann, Hochschule für Verwaltungswissenschaften Speyer, Germany Karl-Heinz Rödiger, Universität Bremen, Germany Sigrid Schubert, Universität Siegen, Germany Dissertations Dorothea Wagner, Universität Karlsruhe, Germany Seminars Reinhard Wilhelm, Universität des Saarlandes, Germany c Gesellschaft für Informatik, Bonn 2005 ° printed by Köllen Druck+Verlag GmbH, Bonn Foreword The Western European Workshop on Research in Cryptology (WEWoRC 2005) was the first of its kind. It was organised as a joint venture between the Katholieke Universiteit Leuven (K.U.Leuven), research group on Computer Security and Industrial Cryptography (COSIC), Royal Holloway, University of London, Information Security Group (ISG), and the Special Interest Group on Cryptology (FG Krypto) in the German Computer Science Society (Gesellschaft für Informatik e.V.). The aim was to bring together researchers in the field of cryptology. The workshop focused on research from Masters and Ph.D. students, and brought them together with more experienced senior researchers. WEWoRC was held in the mediaeval town of Leuven, from July 5–7, 2005. Leuven has a rich academic tradition and an equally enjoyable student life. Hence, it provided the perfect scenery for hosting this event. In total, we had 91 participants from 14 different countries (Austria, Belgium, Canada, Denmark, France, Germany, Ireland, Italy, Japan, the Netherlands, Serbia and Montenegro, Spain, UK, USA). In total, we received 52 submissions of which 49 where chosen for presenting in 15 sessions. Out of these 49 talks, 26 were selected for submission to these post-proceedings. The authors of two papers decided to merge their papers into one, so the programme committee had to review a total of 25 papers. Each paper was reviewed in a careful refereeing process by at least 3 experts in its area; we used a total of 87 reviews for selecting the 12 papers presented here. We are very grateful to all the programme committee member who devoted much effort and valuable time to reading and selecting the papers. These post-proceedings contain the final versions of each paper revised after the conference. Since the revised versions were not checked by the programme committee members rigorously, the authors must bear full responsibility for the contents of their papers. We also want to thank the external experts who assisted the programme committee in evaluating various papers. Special thanks to our sponsors who made it possible to offer WEWoRC for a competitive price. You find their logos on the first page of these post-proceedings. We are in particular debt of the Horst Görtz Stiftung. Moreover, we want to thank DICE (UCL, Belgium) and the “Graduiertenkolleg für Mathematik" (Essen, Germany) for allowing us to support students who could not afford the travel costs and enrolment fees. Similarly, we want to mention the cooperation with EIDMA. In addition, we want to thank the local organising committee for their skillful, professional, and enthusiastic support of WEWoRC. Keep in mind that all work was done voluntarily. Special thanks go in this context to Bart Preneel who kindly agreed that the workshop could be hosted by COSIC and that we were allowed to use the COSIC infrastructure (both technical and administrative) for WEWoRC. Finally, we would like to thank all authors — including those whose submissions were not successful, as well as the workshop participants from around the world for their support, which made WEWoRC a big success. November 2005 Christopher Wolf Leuven iii Stefan Lucks Mannheim Po-Wah Yau London Gold Sponsors Horst Görtz Stiftung Silver Sponsors Bronze Sponsors Programme Committee Frederik Armknecht Roberto Avanzi Lejla Batina Lynn Batten Alex Biryukov Colin Boyd An Braeken Johannes Buchmann Anne Canteaut Dario Catalano Jean-Sebastien Coron Ronald Cramer Serge Fehr Gerhard Frey Steven Galbraith Marc Girault Louis Goubin Ulrich Kühn Tanja Lange Joseph Lano Gregor Leander Arjen Lenstra Franck Leprévost Stefan Lucks Keith Martin Chris Mitchell Kaisa Nyberg Siddika Berna Ors Elisabeth Oswald Christof Paar Kenny Paterson Bart Preneel Jean-Jacques Quisquater Vincent Rijmen Rei Safavi-Naini Nicolas Sendrier Stefaan Seys Igor Shparlinski François-Xavier Standaert Henk van Tilborg Ingrid Verbauwhede Ralf-Philipp Weinmann Christopher Wolf Po-Wah Yau Erik Zenner University of Mannheim, Germany Ruhr Universität Bochum, Germany Katholieke Universiteit Leuven, Belgium Deakin University, Australia Katholieke Universiteit Leuven, Belgium Queensland University of Technology, Australia K.U. Leuven, Belgium TU Darmstadt, Germany INRIA, France ENS, France University of Luxembourg, Luxembourg CWI & Leiden University, The Netherlands CWI, The Netherlands University of Duisburg-Essen, Germany Royal Holloway, University of London, UK France Telecom, France University of Versailles, France Deutsche Telekom Laboratories, Germany Technical University of Denmark, Denmark Katholieke Universiteit Leuven, Belgium Ruhr Universität Bochum, Germany Lucent, USA; TU Eindhoven, The Netherlands University of Luxembourg, Luxembourg University of Mannheim, Germany Royal Holloway, University of London, UK Royal Holloway, University of London, UK Helsinki University of Technology and Nokia, Finland Istanbul Technical University, Turkey TU Graz, Austria Ruhr Universität Bochum, Germany Royal Holloway, University of London, UK Katholieke Universiteit Leuven, Belgium UC Louvain, Belgium TU Graz, Austria; Cryptomathic, Denmark University of Wollongong, Australia INRIA, France Katholieke Universiteit Leuven, Belgium Macquarie University, Australia UC Louvain, Belgium TU Eindhoven, The Netherlands Katholieke Universiteit Leuven, Belgium; UCLA, USA TU Darmstadt, Germany Katholieke Universiteit Leuven, Belgium Royal Holloway, University of London, UK Cryptico, Denmark vii External Reviewers Scott Contin, Özgül Küçük, Wnming Lu, Angela Piper, Dries Schellekens, Jasper Scholten, Dirk Stegemann, İslam Tatlı, Frederik Vercauteren Local Organising Committee (COSIC, K.U. Leuven) General Organisation An Braeken Elke De Mulder Dries Schellekens Jasper Scholten Joe Lano Brecht Wyseur Thomas Herlea Housing, Food Webdesign, Registration Webhosting, Social Programme, Technical Support Connectivity, Post-Proceedings Technical Support Social Programme, Conference Records Submission System, Conference Records Administrative support Péla Noë Accounting support Elvira Wouters Conference Record The conference record with the abstracts of all talks can be found at http://www.cosic.esat.kuleuven.be/publications/article-585.pdf http://www.gi-ev.de/fachbereiche/sicherheit/fg/krypto/downloads/ WEWoRC2005ConferenceRecords.pdf. viii Contents Efficient Electronic Gambling: An Extended Implementation of the Toolbox for Mental Card Games Heiko Stamer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Algebraic Attacks and Annihilators Frederik Armknecht . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 A Secure Network Storage System with Information Privacy SeongHan Shin, Kazukuni Kobara and Hideki Imai . . . . . . . . . . . . 22 A cryptosystem " à la " ElGamal on an elliptic curve over Fp [ε] Marie Virat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 A Scanning Tool for PC Root Public Key Stores Adil Alsaid and Chris J. Mitchell . . . . . . . . . . . . . . . . . . . . . . 45 State Recovery Attacks on Pseudorandom Generators Andrey Sidorenko and Berry Schoenmakers . . . . . . . . . . . . . . . . 53 Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds Jaechul Sung, Jongsung Kim, Changhoon Lee and Seokhie Hong . . . . . 64 Collision attacks on processors with cache and countermeasures Cédric Lauradoux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Applications of Partial Hiding in RSA Eabhnat Ní Fhloinn and Michael Purser . . . . . . . . . . . . . . . . . . 86 Publicly Verifiable Secret Sharing from Paillier’s Cryptosystem Alexandre Ruiz and Jorge L. Villar . . . . . . . . . . . . . . . . . . . . . 98 Issues on Designing a Cryptographic Compiler Stefan Lucks, Nico Schmoigl, Emin İslam Tatlı . . . . . . . . . . . . . . . 109 Analysis of simplified variants of SHA-256 Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 ix