© 2007

Advances in Cryptology – ASIACRYPT 2007

13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings

  • Editors
  • Kaoru Kurosawa
Conference proceedings ASIACRYPT 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4833)

Table of contents

  1. Front Matter
  2. Number Theory and Elliptic Curve

    1. Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik
      Pages 1-12
    2. Antoine Joux, David Naccache, Emmanuel Thomé
      Pages 13-28
    3. Daniel J. Bernstein, Tanja Lange
      Pages 29-50
  3. Protocol

    1. Serge Vaudenay
      Pages 68-87
  4. Invited Talk I

    1. Hash Function Design

      1. Shoichi Hirose, Je Hong Park, Aaram Yun
        Pages 113-129
      2. Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
        Pages 130-146
      3. Thomas Ristenpart, Thomas Shrimpton
        Pages 147-163
    2. Group/Broadcast Cryptography

      1. Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
        Pages 181-199
    3. MAC and Implementation

  5. Multiparty Computation I

    1. Matthew Green, Susan Hohenberger
      Pages 265-282
    2. Matthew Franklin, Mark Gondree, Payman Mohassel
      Pages 283-297
    3. Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
      Pages 298-314
    4. Block Ciphers

      1. Lars R. Knudsen, Vincent Rijmen
        Pages 315-324

About these proceedings


ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2–6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was withdrawn). Each paper was reviewed by at least three members of the Program Committee, while submissions co-authored by a Program Committee member were reviewed by at least ?ve members. (Each PC member could submit at most one paper.) Many high-quality papers were submitted, but due to the relatively small number which could be accepted, many very good papers had to be rejected. After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged). The proceedings contain the revised versions of the accepted papers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents.


Public Key anonymity block ciphers computational algebra cryptanalysis cryptographic protocols cryptography cryptology data security digital signature schemes elliptic curves group signatures hash functions information number theory algorithm analysis and problem complexity

Bibliographic information