Peking SCC2008
Contributed Talks
  • Keqin Feng, Qunying Liao and Feng Liu: On (2^m+1)-variable Symmetric Boolean Functions with Submaximum Algebraic Immunity 2^(m-1)
  • Jintai Ding and John Wagner: Cryptanalysis of Rational Multivariate Public Key Cryptosystems
  • Michael Brickenstein and Stanislav Bulygin: Attacking AES via Solving Systems in the Key Variables Only
  • Shigeo Tsujii, Kohtaro Tadaki and Ryou Fujita: Nonlinear Piece in Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
  • Yasufumi Hashimoto and Kouichi Sakurai: A Construction of Non-Commutative Birational Permutation Signature Scheme
  • Clemens Heuberger: Redundant tau-adic Expansions II: Non-Optimality and Chaotic Behaviour
  • Martin Albrecht and Carlos Cid: Algebraic Techniques in Differential Cryptanalysis
  • Ayoub Otmani, Jean-Pierre Tillich and L¨Ļonard Dallot: Cryptanalysis of a McEliece Cryptosystem Based on Quasi-Cyclic LDPC Codes
  • Ivan Soprunov and Evgenia Soprunova: Toric Surface Codes and Minkowski Length of Polygons
  • Tobias Eibach and Gunnar Völkel: Optimising Gröbner Bases on Bivium
  • Jintai Ding, Daniel Carbarcas, Dieter Schmidt, Johannes Buchmann, Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Stefan Tohaneanu and Ralf-Philipp Weinmann: MutantXL and Mutant Gröbner Basis Algorithm
  • Burçin Eröcal: SCrypt: Using Symbolic Computation to Bridge the Gap Between Algebra and Cryptography
  • Moon Sung Lee and Sang Geun Hahn: Analysis of the GGH Cryptosystem
  • Moritz Minzlaff: Computing Zeta Functions of Superelliptic Curves in Larger Characteristic
  • Olivier Billet, Jacques Patarin and Yannick Seurin: Analysis of Intermediate Field Systems
  • Claude Carlet, Xiangyong Zeng, Chunlei Li and Lei Hu: Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity
  • Ralf-Philipp Weinmann and Johannes Buchmann: Distributed Memory Computation of Row-Reduced Echelon Forms over Finite Fields
  • Robert Gilman, Alex D. Miasnikov, Alexei G. Myasnikov and Alexander Ushakov: New Developments in Commutator Key Exchange
  • Jean-Charles Faug¨¨re and Ludovic Perret: On the Security of UOV
  • Alex D. Myasnikov and Alexander Ushakov: Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol
  • Ilaria Simonetti, Ludovic Perret and Jean-Charles Faug¨¨re: Algebraic Attack Against Trivium
Copyright © 2007 LMIB