Advances in Cryptology – ASIACRYPT 2006

12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

  • Xuejia Lai
  • Kefei Chen
Conference proceedings ASIACRYPT 2006

DOI: 10.1007/11935230

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4284)

Table of contents (30 papers)

  1. Front Matter
  2. Attacks on Hash Functions

    1. Finding SHA-1 Characteristics: General Results and Applications
      Christophe De Cannière, Christian Rechberger
      Pages 1-20
    2. Improved Collision Search for SHA-0
      Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
      Pages 21-36
  3. Stream Ciphers and Boolean Functions

  4. Biometrics and ECC Computation

    1. Secure Sketch for Biometric Templates
      Qiming Li, Yagiz Sutcu, Nasir Memon
      Pages 99-113
    2. The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography
      P. Gaudry, T. Houtmann, D. Kohel, C. Ritzenthaler, A. Weng
      Pages 114-129
    3. Extending Scalar Multiplication Using Double Bases
      Roberto Avanzi, Vassil Dimitrov, Christophe Doche, Francesco Sica
      Pages 130-144
  5. ID-Based Schemes

    1. HIBE With Short Public Parameters Without Random Oracle
      Sanjit Chatterjee, Palash Sarkar
      Pages 145-160
    2. Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
      Nuttapong Attrapadung, Jun Furukawa, Hideki Imai
      Pages 161-177
    3. On the Generic Construction of Identity-Based Signatures with Additional Properties
      David Galindo, Javier Herranz, Eike Kiltz
      Pages 178-193
  6. Public-Key Schemes

    1. On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
      Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
      Pages 194-209
    2. On the Security of OAEP
      Alexandra Boldyreva, Marc Fischlin
      Pages 210-225
  7. RSA and Factorization

  8. Construction of Hash Function

    1. Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
      Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung
      Pages 283-298

About these proceedings


Information Variable algorithm algorithms anonymithy biometrics block ciphers calculus cryptanalysis cryptographic attacks cryptology data security digital signature schemes information theory security

Editors and affiliations

  • Xuejia Lai
    • 1
  • Kefei Chen
    • 1
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-49475-1
  • Online ISBN 978-3-540-49476-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349