Skip to main content
  • Conference proceedings
  • © 2007

Advances in Cryptology – ASIACRYPT 2007

13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4833)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2007.

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-76900-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (35 papers)

  1. Front Matter

  2. Number Theory and Elliptic Curve

    1. A Kilobit Special Number Field Sieve Factorization

      • Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik
      Pages 1-12
    2. When e-th Roots Become Easier Than Factoring

      • Antoine Joux, David Naccache, Emmanuel Thomé
      Pages 13-28
    3. Faster Addition and Doubling on Elliptic Curves

      • Daniel J. Bernstein, Tanja Lange
      Pages 29-50
  3. Protocol

    1. On Privacy Models for RFID

      • Serge Vaudenay
      Pages 68-87
  4. Invited Talk I

    1. Hash Function Design

      1. A Simple Variant of the Merkle-Damgård Scheme with a Permutation
        • Shoichi Hirose, Je Hong Park, Aaram Yun
        Pages 113-129
      2. Seven-Property-Preserving Iterated Hashing: ROX
        • Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
        Pages 130-146
      3. How to Build a Hash Function from Any Collision-Resistant Function
        • Thomas Ristenpart, Thomas Shrimpton
        Pages 147-163
    2. Group/Broadcast Cryptography

      1. Group Encryption
        • Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
        Pages 181-199
    3. MAC and Implementation

      1. On Efficient Message Authentication Via Block Cipher Design Techniques
        • G. Jakimoski, K. P. Subbalakshmi
        Pages 232-248
      2. Symmetric Key Cryptography on Modern Graphics Hardware
        • Jason Yang, James Goodman
        Pages 249-264
  5. Multiparty Computation I

    1. Blind Identity-Based Encryption and Simulatable Oblivious Transfer

      • Matthew Green, Susan Hohenberger
      Pages 265-282
    2. Multi-party Indirect Indexing and Applications

      • Matthew Franklin, Mark Gondree, Payman Mohassel
      Pages 283-297
    3. Two-Party Computing with Encrypted Data

      • Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
      Pages 298-314
    4. Block Ciphers

      1. Known-Key Distinguishers for Some Block Ciphers
        • Lars R. Knudsen, Vincent Rijmen
        Pages 315-324

Other Volumes

  1. Advances in Cryptology – ASIACRYPT 2007

About this book

ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2–6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was withdrawn). Each paper was reviewed by at least three members of the Program Committee, while submissions co-authored by a Program Committee member were reviewed by at least ?ve members. (Each PC member could submit at most one paper.) Many high-quality papers were submitted, but due to the relatively small number which could be accepted, many very good papers had to be rejected. After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged). The proceedings contain the revised versions of the accepted papers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents.

Keywords

  • Public Key
  • anonymity
  • block ciphers
  • computational algebra
  • cryptanalysis
  • cryptographic protocols
  • cryptography
  • cryptology
  • data security
  • digital signature schemes
  • elliptic curves
  • group signatures
  • hash functions
  • information
  • number theory
  • algorithm analysis and problem complexity

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-76900-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)