hal. 770-781
Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending the Resynchronization Attack -- A New Simple Technique to Attack Filter Generators and Related Ciphers -- Side-Channel Analysis -- On XTR and Side-Channel Analysis -- Provably Secure Masking of AES -- Block Cipher Design -- Perfect Diffusion Primitives for Block Ciphers -- Security of the MISTY Structure in the L…
Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols --…
Invited Talk (Abstract) -- Pervasive Computing – A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk …
Invited Talk -- ECRYPT: The Cryptographic Research Challenges for the Next Decade -- Reduction of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions for Public-Key Encryption Schemes -- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel -- Signature Schemes -- A Provably Secure Short Transitive Signature Scheme fr…
Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontol…
Data-Based Applications -- to OGSA-DAI Services -- Using OGSA-DQP to Support Scientific Applications for the Grid -- Mobile Agent-Based Service Provision in Distributed Data Archives -- A Proxy Service for the xrootd Data Server -- A Flexible Two-Level I/O Architecture for Grids -- Data Driven Infrastructure and Policy Selection to Enhance Scientific Applications in Grid -- BioApplications -- M…
Basic Distributed Computing Technologies -- Fundamentals -- Basic Communication Services -- High Assurance Communication -- Remote Procedure Calls and the Client/Server Model -- Styles of Client/Server Computing -- CORBA: The Common Object Request Broker Architecture -- System Support for Fast Client/Server Communication -- Web Technologies -- The World Wide Web -- Major Web Technologies -- Web…
Invited Program -- COPS: Quality of Service vs. Any Service at All -- Beyond Middleware and QoS – Service-Oriented Architectures – Cult or Culture? -- Would Self-organized or Self-managed Networks Lead to Improved QoS? -- Full Papers -- Overlay Networks with Linear Capacity Constraints -- A High-Throughput Overlay Multicast Infrastructure with Network Coding -- On Topological Design of Serv…
Invited Talk -- Abelian Varieties and Cryptography -- Sequences -- Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function and S-Box -- On the Algebraic Immunity of Symmetric Boolean Functions -- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way…