Advances in Cryptology – ASIACRYPT 2007

13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings

  • Editors
  • Kaoru Kurosawa
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4833)

Table of contents

  1. Front Matter
  2. Number Theory and Elliptic Curve

    1. Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik
      Pages 1-12
    2. Antoine Joux, David Naccache, Emmanuel Thomé
      Pages 13-28
    3. Daniel J. Bernstein, Tanja Lange
      Pages 29-50
  3. Protocol

  4. Invited Talk I

    1. Hash Function Design

      1. Shoichi Hirose, Je Hong Park, Aaram Yun
        Pages 113-129
      2. Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
        Pages 130-146
      3. Thomas Ristenpart, Thomas Shrimpton
        Pages 147-163
    2. Group/Broadcast Cryptography

      1. Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
        Pages 181-199
    3. MAC and Implementation

  5. Multiparty Computation I

    1. Matthew Green, Susan Hohenberger
      Pages 265-282
    2. Matthew Franklin, Mark Gondree, Payman Mohassel
      Pages 283-297
    3. Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
      Pages 298-314
    4. Block Ciphers

      1. Lars R. Knudsen, Vincent Rijmen
        Pages 315-324

About these proceedings

Introduction

ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2–6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was withdrawn). Each paper was reviewed by at least three members of the Program Committee, while submissions co-authored by a Program Committee member were reviewed by at least ?ve members. (Each PC member could submit at most one paper.) Many high-quality papers were submitted, but due to the relatively small number which could be accepted, many very good papers had to be rejected. After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged). The proceedings contain the revised versions of the accepted papers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents.

Keywords

Public Key anonymity block ciphers computational algebra cryptanalysis cryptographic protocols cryptography cryptology data security digital signature schemes elliptic curves group signatures hash functions information number theory

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-76900-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-76899-9
  • Online ISBN 978-3-540-76900-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book