Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Lai, Xuejia (Επιμελητής έκδοσης), Chen, Kefei (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4284
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Attacks on Hash Functions
  • Finding SHA-1 Characteristics: General Results and Applications
  • Improved Collision Search for SHA-0
  • Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
  • Stream Ciphers and Boolean Functions
  • New Guess-and-Determine Attack on the Self-Shrinking Generator
  • On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
  • Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity
  • Biometrics and ECC Computation
  • Secure Sketch for Biometric Templates
  • The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography
  • Extending Scalar Multiplication Using Double Bases
  • ID-Based Schemes
  • HIBE With Short Public Parameters Without Random Oracle
  • Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
  • On the Generic Construction of Identity-Based Signatures with Additional Properties
  • Public-Key Schemes
  • On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
  • On the Security of OAEP
  • Relationship Between Standard Model Plaintext Awareness and Message Hiding
  • RSA and Factorization
  • On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms
  • Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption
  • A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants
  • Construction of Hash Function
  • Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
  • Multi-Property-Preserving Hash Domain Extension and the EMD Transform
  • Combining Compression Functions and Block Cipher-Based Hash Functions
  • Protocols
  • A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
  • A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
  • Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
  • Block Ciphers
  • KFC – The Krazy Feistel Cipher
  • Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions
  • New Cryptanalytic Results on IDEA
  • Signatures
  • New Approach for Selectively Convertible Undeniable Signature Schemes
  • Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
  • Analysis of One Popular Group Signature Scheme.