Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers /

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Nguyen, Phong Q. (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Series:Lecture Notes in Computer Science, 4341
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Signatures and Lightweight Cryptography
  • Probabilistic Multivariate Cryptography
  • Short 2-Move Undeniable Signatures
  • Searching for Compact Algorithms: cgen
  • Invited Talk
  • On Pairing-Based Cryptosystems
  • Pairing-Based Cryptography
  • A New Signature Scheme Without Random Oracles from Bilinear Pairings
  • Efficient Dynamic k-Times Anonymous Authentication
  • Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?
  • Algorithmic Number Theory
  • Factorization of Square-Free Integers with High Bits Known
  • Scalar Multiplication on Koblitz Curves Using Double Bases
  • Compressed Jacobian Coordinates for OEF
  • Ring Signatures and Group Signatures
  • On the Definition of Anonymity for Ring Signatures
  • Escrowed Linkability of Ring Signatures and Its Applications
  • Dynamic Fully Anonymous Short Group Signatures
  • Hash Functions
  • Formalizing Human Ignorance
  • Discrete Logarithm Variants of VSH
  • How to Construct Sufficient Conditions for Hash Functions
  • Cryptanalysis
  • Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators
  • On the Internal Structure of Alpha-MAC
  • A Weak Key Class of XTEA for a Related-Key Rectangle Attack
  • Key Agreement and Threshold Cryptography
  • Deniable Group Key Agreement
  • An Ideal and Robust Threshold RSA
  • Towards Provably Secure Group Key Agreement Building on Group Theory
  • Public-Key Encryption
  • Universally Composable Identity-Based Encryption
  • Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate
  • Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.