Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4284 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Attacks on Hash Functions
- Finding SHA-1 Characteristics: General Results and Applications
- Improved Collision Search for SHA-0
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Stream Ciphers and Boolean Functions
- New Guess-and-Determine Attack on the Self-Shrinking Generator
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity
- Biometrics and ECC Computation
- Secure Sketch for Biometric Templates
- The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography
- Extending Scalar Multiplication Using Double Bases
- ID-Based Schemes
- HIBE With Short Public Parameters Without Random Oracle
- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
- On the Generic Construction of Identity-Based Signatures with Additional Properties
- Public-Key Schemes
- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
- On the Security of OAEP
- Relationship Between Standard Model Plaintext Awareness and Message Hiding
- RSA and Factorization
- On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms
- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption
- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants
- Construction of Hash Function
- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Combining Compression Functions and Block Cipher-Based Hash Functions
- Protocols
- A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
- A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
- Block Ciphers
- KFC – The Krazy Feistel Cipher
- Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions
- New Cryptanalytic Results on IDEA
- Signatures
- New Approach for Selectively Convertible Undeniable Signature Schemes
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Analysis of One Popular Group Signature Scheme.