Book Volume 4833 2007

Advances in Cryptology – ASIACRYPT 2007

13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings


ISBN: 978-3-540-76899-9 (Print) 978-3-540-76900-2 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Number Theory and Elliptic Curve

    1. Chapter

      Pages 1-12

      A Kilobit Special Number Field Sieve Factorization

    2. Chapter

      Pages 13-28

      When e-th Roots Become Easier Than Factoring

    3. Chapter

      Pages 29-50

      Faster Addition and Doubling on Elliptic Curves

  3. Protocol

    1. Chapter

      Pages 51-67

      A Non-interactive Shuffle with Pairing Based Verifiability

    2. Chapter

      Pages 68-87

      On Privacy Models for RFID

  4. Invited Talk I

    1. Chapter

      Pages 88-112

      Obtaining Universally Compoable Security: Towards the Bare Bones of Trust

    2. Hash Function Design

      1. Chapter

        Pages 113-129

        A Simple Variant of the Merkle-Damgård Scheme with a Permutation

      2. Chapter

        Pages 130-146

        Seven-Property-Preserving Iterated Hashing: ROX

      3. Chapter

        Pages 147-163

        How to Build a Hash Function from Any Collision-Resistant Function

      Group/Broadcast Cryptography

      1. Chapter

        Pages 164-180

        Fully Anonymous Group Signatures Without Random Oracles

      2. Chapter

        Pages 181-199

        Group Encryption

      3. Chapter

        Pages 200-215

        Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys

      MAC and Implementation

      1. Chapter

        Pages 216-231

        Boosting Merkle-Damgård Hashing for Message Authentication

      2. Chapter

        Pages 232-248

        On Efficient Message Authentication Via Block Cipher Design Techniques

      3. Chapter

        Pages 249-264

        Symmetric Key Cryptography on Modern Graphics Hardware

  5. Multiparty Computation I

    1. Chapter

      Pages 265-282

      Blind Identity-Based Encryption and Simulatable Oblivious Transfer

    2. Chapter

      Pages 283-297

      Multi-party Indirect Indexing and Applications

    3. Chapter

      Pages 298-314

      Two-Party Computing with Encrypted Data

    4. Block Ciphers

      1. Chapter

        Pages 315-324

        Known-Key Distinguishers for Some Block Ciphers

      2. Chapter

        Pages 325-341

        Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions

previous Page of 2