© 2007

Advances in Cryptology – ASIACRYPT 2007

13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings

  • Editors
  • Kaoru Kurosawa
Conference proceedings ASIACRYPT 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4833)

Table of contents

  1. Multiparty Computation I

    1. Block Ciphers

      1. Jacques Patarin, Valérie Nachef, Côme Berbain
        Pages 325-341
      2. David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu
        Pages 342-356
  2. Multiparty Computation II

    1. Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen
      Pages 357-375
    2. Zuzana Beerliová-Trubíniová, Martin Hirt
      Pages 376-392
    3. Zuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser
      Pages 393-409
    4. Anne Broadbent, Alain Tapp
      Pages 410-426
    5. Foundation

      1. Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
        Pages 444-459
      2. Gilles Brassard, Anne Broadbent, Joseph Fitzsimons, Sébastien Gambs, Alain Tapp
        Pages 460-473
  3. Invited Talk II

    1. Public Key Encryption

      1. Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass et al.
        Pages 502-518
      2. Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
        Pages 519-535
    2. Cryptanalysis

      1. Florian Mendel, Vincent Rijmen
        Pages 536-550
      2. Thomas Peyrin
        Pages 551-567
      3. Martin Hell, Thomas Johansson
        Pages 568-581
  4. Back Matter

About these proceedings


ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2–6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was withdrawn). Each paper was reviewed by at least three members of the Program Committee, while submissions co-authored by a Program Committee member were reviewed by at least ?ve members. (Each PC member could submit at most one paper.) Many high-quality papers were submitted, but due to the relatively small number which could be accepted, many very good papers had to be rejected. After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged). The proceedings contain the revised versions of the accepted papers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents.


Public Key anonymity block ciphers computational algebra cryptanalysis cryptographic protocols cryptography cryptology data security digital signature schemes elliptic curves group signatures hash functions information number theory

Bibliographic information