Online Library TheLib.net » Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
cover of the book Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

Ebook: Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

00
27.01.2024
4
0

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2006, held in Shanghai, China in December 2006.

The 30 revised full papers presented were carefully reviewed and selected from 314 submissions. The papers are organized in topical sections on attacks on hash functions, stream ciphers and boolean functions, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.




This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2006, held in Shanghai, China in December 2006.

The 30 revised full papers presented were carefully reviewed and selected from 314 submissions. The papers are organized in topical sections on attacks on hash functions, stream ciphers and boolean functions, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.


Content:
Front Matter....Pages -
Finding SHA-1 Characteristics: General Results and Applications....Pages 1-20
Improved Collision Search for SHA-0....Pages 21-36
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions....Pages 37-53
New Guess-and-Determine Attack on the Self-Shrinking Generator....Pages 54-68
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition....Pages 69-83
Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity....Pages 84-98
Secure Sketch for Biometric Templates....Pages 99-113
The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography....Pages 114-129
Extending Scalar Multiplication Using Double Bases....Pages 130-144
HIBE With Short Public Parameters Without Random Oracle....Pages 145-160
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys....Pages 161-177
On the Generic Construction of Identity-Based Signatures with Additional Properties....Pages 178-193
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator....Pages 194-209
On the Security of OAEP....Pages 210-225
Relationship Between Standard Model Plaintext Awareness and Message Hiding....Pages 226-240
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms....Pages 241-251
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption....Pages 252-266
A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants....Pages 267-282
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding....Pages 283-298
Multi-Property-Preserving Hash Domain Extension and the EMD Transform....Pages 299-314
Combining Compression Functions and Block Cipher-Based Hash Functions....Pages 315-331
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model....Pages 332-347
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols....Pages 348-363
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution....Pages 364-379
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions....Pages 380-395
New Cryptanalytic Results on IDEA....Pages 396-411
New Approach for Selectively Convertible Undeniable Signature Schemes....Pages 412-427
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures....Pages 428-443
Analysis of One Popular Group Signature Scheme....Pages 444-459
Back Matter....Pages 460-466
....Pages -
Download the book Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen