Advances in Cryptology – ASIACRYPT 2006

12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

  • Xuejia Lai
  • Kefei Chen
Conference proceedings ASIACRYPT 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4284)

Table of contents

  1. Front Matter
  2. Attacks on Hash Functions

    1. Christophe De Cannière, Christian Rechberger
      Pages 1-20
    2. Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
      Pages 21-36
  3. Stream Ciphers and Boolean Functions

  4. Biometrics and ECC Computation

    1. Qiming Li, Yagiz Sutcu, Nasir Memon
      Pages 99-113
    2. P. Gaudry, T. Houtmann, D. Kohel, C. Ritzenthaler, A. Weng
      Pages 114-129
    3. Roberto Avanzi, Vassil Dimitrov, Christophe Doche, Francesco Sica
      Pages 130-144
  5. ID-Based Schemes

    1. Sanjit Chatterjee, Palash Sarkar
      Pages 145-160
    2. Nuttapong Attrapadung, Jun Furukawa, Hideki Imai
      Pages 161-177
    3. David Galindo, Javier Herranz, Eike Kiltz
      Pages 178-193
  6. Public-Key Schemes

    1. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
      Pages 194-209
    2. Alexandra Boldyreva, Marc Fischlin
      Pages 210-225
  7. RSA and Factorization

  8. Construction of Hash Function

    1. Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung
      Pages 283-298
    2. Mihir Bellare, Thomas Ristenpart
      Pages 299-314
    3. Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matt Robshaw
      Pages 315-331
  9. Protocols

  10. Block Ciphers

    1. Thomas Baignères, Matthieu Finiasz
      Pages 380-395
    2. Jacques Patarin, Valérie Nachef, Côme Berbain
      Pages 396-411
    3. Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 412-427
  11. Signatures

  12. Back Matter

About these proceedings


Information Variable algorithm algorithms anonymithy biometrics block ciphers calculus cryptanalysis cryptographic attacks cryptology data security digital signature schemes information theory security

Editors and affiliations

  • Xuejia Lai
    • 1
  • Kefei Chen
    • 1
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Bibliographic information