Lecture Notes in Computer Science 5580

Similar documents
Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 5671

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 4883

Lecture Notes in Computer Science 4454

Lecture Notes in Computer Science 4728

Lecture Notes in Computer Science 5665

Lecture Notes in Computer Science 3819

Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 7480

Lecture Notes in Computer Science 3897

Lecture Notes in Computer Science 3376

Lecture Notes in Computer Science 4214

Lecture Notes in Computer Science 6663

Lecture Notes in Computer Science 4797

Lecture Notes in Computer Science 6035

Lecture Notes in Artificial Intelligence 3176

Advances in Cryptology EUROCRYPT 2001

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 6055

Lecture Notes in Computer Science 5004

Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 7342

Lecture Notes in Computer Science 4939

Lecture Notes in Computer Science 4593

Research Reports ESPRIT

Lecture Notes in Computer Science 5474

Lecture Notes in Computer Science 8341

Lecture Notes in Computer Science 3527

Lecture Notes in Computer Science 10644

Lecture Notes in Computer Science 3557

Lecture Notes in Computer Science 6737

Lecture Notes in Computer Science 1807 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Codes, Cryptology, and Information Security

Lecture Notes in Computer Science 6280

Detection of Intrusions and Malware, and Vulnerability Assessment

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science

Lecture Notes in Computer Science 6037

Lecture Notes in Computer Science 4964

Member of ANR project High Performance Algebraic Computing (HPAC)

Lecture Notes in Computer Science 3507

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

Lecture Notes in Computer Science 4833

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Lecture Notes in Computer Science 5587

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Current Position: Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science Massachusetts Institute of Technology

Lecture Notes in Computer Science 4449

Lecture Notes in Computer Science 5978

Lecture Notes in Computer Science 6571

Lecture Notes in Computer Science 7149

Lecture Notes in Computer Science 7140

Lecture Notes in Computer Science 4586

Lecture Notes in Computer Science 7384

Lecture Notes in Computer Science 9804

Lecture Notes in Computer Science 5083

Lecture Notes in Computer Science 8036

Emotional Engineering Volume 5

German Yearbook on Business History 1986

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5438

Lecture Notes in Computer Science 5581

Lecture Notes in Computer Science 5284

Lecture Notes in Computer Science 5487

Lecture Notes in Computer Science 5677

Lecture Notes in Computer Science 5443

Lecture Notes in Artificial Intelligence 4327

Welcome to Workshop Designing Collaborative Interactive Spaces for e Creativity, e Science and e Learning AVI 2012, Capri, Italy, May 25 th.

Lecture Notes in Computer Science 4355

Lecture Notes in Computer Science 7679

Lecture Notes in Computer Science 7189

Lecture Notes in Computer Science 3925

Curriculum Vitae for Marlis Buchman

REPORT OF THE TELSIKS 2001 CONFERENCE

Process Maturity Profile

INTERNATIONAL JOURNAL OF. Cultural Property VOLUME NUMBER 2 ISSN

Lecture Notes in Computer Science 7118

TRAVEL FELLOWSHIP. John Belle traveling in England between studies at the Architectural Association in London.

Curriculum Vitae. December 2, 2015

Lecture Notes in Computer Science 6815

Lecture Notes in Computer Science 6647

Lecture Notes in Computer Science 4547

CESAM Certified Members

Lecture Notes in Artificial Intelligence

Presented at the FIG Congress 2018, May 6-11, 2018 in Istanbul, Turkey

Lecture Notes in Computer Science 3061

Early Modern Philosophers and the Renaissance Legacy

Lecture Notes in Computer Science 8031

This page intentionally left blank

Lecture Notes in Computer Science 7744

9.0 SCOR-RELATED MEETINGS

ISNI. International Society of Neuroimmunology PROFILE 2013

Lecture Notes in Computer Science 9211

Process Maturity Profile

Lecture Notes in Computer Science 7896

Lecture Notes in Computer Science 10852

Lecture Notes in Computer Science 4006

Lecture Notes in Computer Science 9596

Transcription:

Lecture Notes in Computer Science 5580 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Bart Preneel (Ed.) Progress in Cryptology AFRICACRYPT 2009 Second International Conference on Cryptology in Africa Gammarth, Tunisia, June 21-25, 2009 Proceedings 13

Volume Editor Bart Preneel Katholieke Universiteit Leuven Dept. Electrical Engineering-ESAT/COSIC Kasteelpark Arenberg 10, Bus 2446, 3001 Leuven, Belgium E-mail: bart.preneel@esat.kuleuven.be Library of Congress Control Number: Applied for CR Subject Classification (1998): E.3, F.2.1-2, G.2.1, D.4.6, K.6.5, C.2, J.1 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-02383-5 Springer Berlin Heidelberg New York ISBN-13 978-3-642-02383-5 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com Springer-Verlag Berlin Heidelberg 2009 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12693764 06/3180 543210

Preface AFRICACRYPT 2009 was held during June 21 25, 2009 in Gammarth, Tunisia. After AFRICACRYPT 2008 in Casablanca, Morocco, it was the second international research conference in Africa dedicated to cryptography. The conference received 70 submissions; four of these were identified as irregular submissions. The remaining papers went through a careful doubly anonymous review process. Every paper received at least three reports; papers with a Program Committee member as co-author received five reports. After the review period, 25 papers were accepted for presentation. The authors were requested to revise their papers based on the comments received. The program was completed with invited talks by Antoine Joux, Ueli Maurer and Nigel Smart. First and foremost we would like to thank the members of the Program Committee for the many hours spent on reviewing and discussing the papers, thereby producing more than 600 Kb of comments. They did an outstanding job. We would also like to thank the numerous external reviewers for their assistance. We are also indebted to Shai Halevi for the support provided for his excellent Web- Submission-and-Review software package. We also wish to heartily thank Sami Ghazali, the General Chair, and Sami Omar, the General Co-chair, for their efforts in the organization of the conference. Special thanks go to the Tunisian Ministry of Communication Technologies, the National Digital Certification Agency, and the Tunisian Internet Agency for their support of the organization. Finally, we would like to thank the participants, submitters, authors and presenters who all together made AFRICACRYPT 2009 a great success. I hope that the AFRICACRYPT conference tradition has now taken firm root and that we will witness a fruitful development of academic research in cryptology in Africa. April 2009 Bart Preneel

Organization AFRICACRYPT 2009 was organized under the patronage of the Tunisian Ministry of Communication Technologies by the National Digital Certification Agency, and the Tunisian Internet Agency. AFRIACRYPT 2009 was organized in cooperation with the International Association for Cryptologic Research (IACR). Executive Committee Conference Chair Conference Co-chair Program Chair Sami Ghazali (National Digital Certification Agency, Tunisia) Sami Omar (University of Tunis, Tunisia) Bart Preneel (Katholieke Universiteit Leuven, Belgium) Program Committee Michel Abdalla Paulo Barreto Tom Berson Anne Canteaut Dario Catalano Hervé Chabanne Jean-Marc Couveignes Kris Gaj Henri Gilbert Helena Handschuh Martin Hirt Seokhie Hong Tetsu Iwata Yassine Lakhnech Tanja Lange Helger Lipmaa Keith Martin Mitsuru Matsui Alexander May Sihem Mesnager Kaisa Nyberg Sami Omar Elisabeth Oswald Reihaneh Safavi-Naini Kazue Sako Ali Aydın Selçuk ENS, Paris, France University of São Paulo (USP), Brazil Anagram Laboratories, USA INRIA Paris-Rocquencourt, France University of Catania, Italy Sagem SécuritéandTélécom Paristech, France Université Toulouse2,France George Mason University, USA Orange Labs, France Spansion, France ETH Zurich, Switzerland Korea University, Korea Nagoya University, Japan University Joseph Fourier-Grenoble, France Technische Universiteit Eindhoven, The Netherlands Cybernetica AS, Estonia Royal Holloway University of London, UK Mitsubishi Electric, Japan R.U. Bochum, Germany Université Paris 8, France Helsinki University of Technology and Nokia, Finland University of Tunis, Tunisia University of Bristol, UK University of Calgary, Canada NEC, Japan Bilkent University, Turkey

VIII Organization Christine Swart Serge Vaudenay Frederik Vercauteren Michael Wiener Yiqun Lisa Yin University of Cape Town, South Africa EPFL, Switzerland Katholieke Universiteit Leuven, Belgium Cryptographic Clarity, Canada Independent Security Consultant, USA External Reviewers Divesh Aggarwal Hadi Ahmadi Murat Ak Toshinori Araki Roberto Avanzi Lejla Batina Aurelie Bauer Zuzana Beerliova Daniel J. Bernstein Arnaud Boscher Julien Bringer Renier Broker Bogdan Carbunar Claude Carlet Rafik Chaabouni Donghoon Chang Claude Crépeau Hüseyin Demirci Alex Dent Mario Di Raimondo Orr Dunkelman Junfeng Fan Dario Fiore Jun Furukawa Martin Gagne Pierrick Gaudry Benedikt Gierlichs Malakondayya Gorantla Nicolas Guillermin Tim Güneysu Risto Hakala Jens Hermans Miia Hermelin Thomas Icart Toshiyuki Isshiki Takashi Ito Orhun Kara Kamer Kaya Bruno Kindarji Miroslav Knezevic Patrick Lacharme Fabien Laguillaumie Thanh Ha Le Jesang Lee Benoît Libert Moses Liskov Christoph Lucas Andrew Moss María Naya-Plasencia Gregory Neven Satoshi Obana Khaled Ouafi Sylvain Pasini Maura Paterson Ludovic Perret Duong Hieu Phan Dominik Raub Yu Sasaki Berry Schoenmakers Nicolas Sendrier Hongsong Shi Igor Shparlinski Francesco Sica Michal Sramka Drew Sutherland Daisuke Suzuki Björn Tackmann Katsuyuki Takashima Isamu Teranishi Stefano Tessaro Mike Tunstall Damien Vergnaud Ivan Visconti Bogdan Warinschi Qianhong Wu Vassilis Zikas

Table of Contents Hash Functions Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL... 1 Gaoli Wang and Shaohui Wang Cryptanalysis of Vortex... 14 Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, and Søren S. Thomsen Two Passes of Tiger Are Not One-Way... 29 Florian Mendel Block Ciphers Generic Attacks on Feistel Networks with Internal Permutations... 41 Joana Treger and Jacques Patarin Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks... 60 Marine Minier, Raphael C.-W. Phan, and Benjamin Pousse Asymmetric Encryption Reducing Key Length of the McEliece Cryptosystem... 77 Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, and Ayoub Otmani Cryptanalysis of RSA Using the Ratio of the Primes... 98 Abderrahmane Nitaj Digital Signatures New RSA-Based (Selectively) Convertible Undeniable Signature Schemes... 116 Le Trieu Phong, Kaoru Kurosawa, and Wakaha Ogata A Schnorr-Like Lightweight Identity-Based Signature Scheme... 135 David Galindo and Flavio D. Garcia On the Theoretical Gap between Group Signatures with and without Unlinkability... 149 Go Ohtake, Arisa Fujii, Goichiro Hanaoka, and Kazuto Ogawa

X Table of Contents Practical Threshold Signatures with Linear Secret Sharing Schemes... 167 İlker Nadi Bozkurt, Kamer Kaya, and Ali Aydın Selçuk Asymmetric Encryption and Anonymity Certified Encryption Revisited... 179 Pooya Farshim and Bogdan Warinschi Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems... 198 Siamak F. Shahandashti and Reihaneh Safavi-Naini Anonymity from Public Key Encryption to Undeniable Signatures... 217 Laila El Aimani Key Agreement Protocols Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps... 235 Manuel Barbosa and Pooya Farshim Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness... 254 Michel Abdalla, Dario Catalano, Céline Chevalier, and David Pointcheval Cryptographic Protocols Unifying Zero-Knowledge Proofs of Knowledge... 272 Ueli Maurer Co-sound Zero-Knowledge with Public Keys... 287 Carmine Ventre and Ivan Visconti Another Look at Extended Private Information Retrieval Protocols... 305 Julien Bringer and Hervé Chabanne Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions... 323 Huafei Zhu and Feng Bao Efficient Implementations Exponent Recoding and Regular Exponentiation Algorithms... 334 Marc Joye and Michael Tunstall

Table of Contents XI Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware... 350 Owen Harrison and John Waldron Fast Elliptic-Curve Cryptography on the Cell Broadband Engine... 368 Neil Costigan and Peter Schwabe On Modular Decomposition of Integers... 386 Billy Bob Brumley and Kaisa Nyberg Implementation Attacks Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed... 403 Markus Kasper, Timo Kasper, Amir Moradi, and Christof Paar An Improved Fault Based Attack of the Advanced Encryption Standard... 421 Debdeep Mukhopadhyay Author Index... 435