IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of ASIACRYPT 2006

Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings , Springer
Finding SHA-1 Characteristics: General Results and Applications., Christophe De Cannière, Christian Rechberger, pp. 1-20
 PDF  postscript BibTeX
Improved Collision Search for SHA-0., Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta, pp. 21-36
 PDF  postscript BibTeX
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions., Scott Contini, Yiqun Lisa Yin, pp. 37-53
 PDF  postscript BibTeX
New Guess-and-Determine Attack on the Self-Shrinking Generator., Bin Zhang, Dengguo Feng, pp. 54-68
 PDF  postscript BibTeX
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition., Souradyuti Paul, Bart Preneel, pp. 69-83
 PDF  postscript BibTeX
Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity., Na Li, Wen-Feng Qi, pp. 84-98
 PDF  postscript BibTeX
Secure Sketch for Biometric Templates., Qiming Li, Yagiz Sutcu, Nasir D. Memon, pp. 99-113
 PDF  postscript BibTeX
The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography., Pierrick Gaudry, T. Houtmann, D. Kohel, Christophe Ritzenthaler, A. Weng, pp. 114-129
 PDF  postscript BibTeX
Extending Scalar Multiplication Using Double Bases., Roberto Maria Avanzi, Vassil Dimitrov, Christophe Doche, Francesco Sica, pp. 130-144
 PDF  postscript BibTeX
HIBE With Short Public Parameters Without Random Oracle., Sanjit Chatterjee, Palash Sarkar, pp. 145-160
 PDF  postscript BibTeX
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys., Nuttapong Attrapadung, Jun Furukawa, Hideki Imai, pp. 161-177
 PDF  postscript BibTeX
On the Generic Construction of Identity-Based Signatures with Additional Properties., David Galindo, Javier Herranz, Eike Kiltz, pp. 178-193
 PDF  postscript BibTeX
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator., Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang, pp. 194-209
 PDF  postscript BibTeX
On the Security of OAEP., Alexandra Boldyreva, Marc Fischlin, pp. 210-225
 PDF  postscript BibTeX
Relationship Between Standard Model Plaintext Awareness and Message Hiding., Isamu Teranishi, Wakaha Ogata, pp. 226-240
 PDF  postscript BibTeX
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms., Gregor Leander, Andy Rupp, pp. 241-251
 PDF  postscript BibTeX
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption., Pascal Paillier, Jorge Luis Villar, pp. 252-266
 PDF  postscript BibTeX
A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants., Ellen Jochemsz, Alexander May, pp. 267-282
 PDF  postscript BibTeX
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding., Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung, pp. 283-298
 PDF  postscript BibTeX
Multi-Property-Preserving Hash Domain Extension and the EMD Transform., Mihir Bellare, Thomas Ristenpart, pp. 299-314
 PDF  postscript BibTeX
Combining Compression Functions and Block Cipher-Based Hash Functions., Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw, pp. 315-331
 PDF  postscript BibTeX
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model., Michel Abdalla, David Pointcheval, pp. 332-347
 PDF  postscript BibTeX
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols., Ventzislav Nikov, Svetla Nikova, Bart Preneel, pp. 348-363
 PDF  postscript BibTeX
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution., Satoshi Obana, Toshinori Araki, pp. 364-379
 PDF  postscript BibTeX
KFC - The Krazy Feistel Cipher., Thomas Baignères, Matthieu Finiasz, pp. 380-395
 PDF  postscript BibTeX
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions., Jacques Patarin, Valérie Nachef, Côme Berbain, pp. 396-411
 PDF  postscript BibTeX
New Cryptanalytic Results on IDEA., Eli Biham, Orr Dunkelman, Nathan Keller, pp. 412-427
 PDF  postscript BibTeX
New Approach for Selectively Convertible Undeniable Signature Schemes., Kaoru Kurosawa, Tsuyoshi Takagi, pp. 428-443
 PDF  postscript BibTeX
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures., Jens Groth, pp. 444-459
 PDF  postscript BibTeX
Analysis of One Popular Group Signature Scheme., Zhengjun Cao, pp. 460-466
 PDF  postscript BibTeX

[ IACR home page ] © IACR