Book Volume 4284 2006

Advances in Cryptology – ASIACRYPT 2006

12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings


ISBN: 978-3-540-49475-1 (Print) 978-3-540-49476-8 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Attacks on Hash Functions

    1. Chapter

      Pages 1-20

      Finding SHA-1 Characteristics: General Results and Applications

    2. Chapter

      Pages 21-36

      Improved Collision Search for SHA-0

    3. Chapter

      Pages 37-53

      Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions

  3. Stream Ciphers and Boolean Functions

    1. Chapter

      Pages 54-68

      New Guess-and-Determine Attack on the Self-Shrinking Generator

    2. Chapter

      Pages 69-83

      On the (In)security of Stream Ciphers Based on Arrays and Modular Addition

    3. Chapter

      Pages 84-98

      Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity

  4. Biometrics and ECC Computation

    1. Chapter

      Pages 99-113

      Secure Sketch for Biometric Templates

    2. Chapter

      Pages 114-129

      The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography

    3. Chapter

      Pages 130-144

      Extending Scalar Multiplication Using Double Bases

  5. ID-Based Schemes

    1. Chapter

      Pages 145-160

      HIBE With Short Public Parameters Without Random Oracle

    2. Chapter

      Pages 161-177

      Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys

    3. Chapter

      Pages 178-193

      On the Generic Construction of Identity-Based Signatures with Additional Properties

  6. Public-Key Schemes

    1. Chapter

      Pages 194-209

      On the Provable Security of an Efficient RSA-Based Pseudorandom Generator

    2. Chapter

      Pages 210-225

      On the Security of OAEP

    3. Chapter

      Pages 226-240

      Relationship Between Standard Model Plaintext Awareness and Message Hiding

  7. RSA and Factorization

    1. Chapter

      Pages 241-251

      On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms

    2. Chapter

      Pages 252-266

      Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption

    3. Chapter

      Pages 267-282

      A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants

  8. Construction of Hash Function

    1. Chapter

      Pages 283-298

      Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding

    2. Chapter

      Pages 299-314

      Multi-Property-Preserving Hash Domain Extension and the EMD Transform

previous Page of 2