ASIACRYPT 2007:
Kuching, Malaysia
Kaoru Kurosawa (Ed.):
Advances in Cryptology - ASIACRYPT 2007,
13th International Conference
on the Theory and Application of Cryptology and Information Security,
Kuching, Malaysia, December 2-6, 2007,
Lecture Notes in Computer Science, 4833 Springer 2007,
ISBN 978-3-540-76899-9
Proceedings.
Preface , by Kaoru Kurosawa
December 2-6, 2007, Kuching, Sarawak, MALAYSIA
Sponsored by
the International Association for Cryptologic Research (IACR)
in cooperation with
the Information Security Research (iSECURES) Lab
of Swinburne University of Technology (Sarawak Campus)
and
the Sarawak Development Institute (SDI)
General Chair: Raphael C.-W. Phan, EPFL, SWITZERLAND
Program Chair: Kaoru Kurosawa, Ibaraki University, JAPAN
Program Commitee
Masayuki Abe | NTT, Japan | |
Alex Biryukov | University of Luxembourg, Luxembourg | |
Alexandra Boldyreva | Georgia Institute of Technology, USA | |
Jung Hee Cheon | Seoul National University, Korea | |
Jean-Sebastien Coron | University of Luxembourg, Luxembourg | |
Joan Daemen | STMicroelectronics, Belgium | |
Serge Fehr | CWI, Netherlands | |
Steven Galbraith | Royal Holloway Univ. of London, UK | |
Craig Gentry | Stanford University, USA | |
Henri Gilbert | France Telecom, France | |
Shai Halevi | IBM T.J. Watson Research Center, USA | |
Helena Handschuh | Spansion, France | |
Tetsu Iwata | Nagoya University, Japan | |
Thomas Johansson | Lund University, Sweden | |
Marc Joye | Thomson R&D France, France | |
Jonathan Katz | University of Maryland, USA | |
Lars R. Knudsen | Technical University of Denmark, Denmark | |
Hugo Krawczyk | IBM T.J. Watson Research Center, USA | |
Kaoru Kurosawa | Ibaraki University, Japan | |
Xuejia Lai | Shanghai Jiaotong University, China | |
Arjen K. Lenstra | EPFL IC LACAL, Switzerland | |
Stefan Lucks | Bauhaus-University Weimar, Germany | |
Anna Lysyanskaya | Brown University, USA | |
Alexander May | Technische Universitdt Darmstadt, Germany | |
Jesper Buus Nielsen | University of Aarhus, Denmark | |
Elisabeth Oswald | University of Bristol, UK | |
Josef Pieprzyk | Macquarie University, Australia | |
Bart Preneel | Katholieke Universiteit Leuven, Belgium | |
Pandu Rangan | Indian Institute of Technology, India | |
Palash Sarkar | Indian Statistical Institute, India | |
Nigel Smart | University Bristol, UK | |
Tsuyoshi Takagi | Future University-Hakodate, Japan | |
Serge Vaudenay | EPFL, Switzerland | |
Brent Waters | SRI International, USA | |
Stefan Wolf | ETH Zurich, Switzerland |
External Reviewers
Number Theory and Elliptic Curve
-
Kazumaro Aoki
,
Jens Franke
,
Thorsten Kleinjung
,
Arjen K. Lenstra
,
Dag Arne Osvik
:
A Kilobit Special Number Field Sieve Factorization , ( .ps ). 1-12
BibTeX -
Antoine Joux
,
David Naccache
,
Emmanuel Thomé
:
When e -th Roots Become Easier Than Factoring , ( .ps ). 13-28
BibTeX -
Daniel J. Bernstein
,
Tanja Lange
:
Faster Addition and Doubling on Elliptic Curves , ( .ps ). 29-50
BibTeX
Protocol
-
Jens Groth
,
Steve Lu
:
A Non-interactive Shuffle with Pairing Based Verifiability , ( .ps ). 51-67
BibTeX -
Serge Vaudenay
:
On Privacy Models for RFID , ( .ps ). 68-87
BibTeX
Invited Talk I
-
Ran Canetti
:
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust , ( .ps ). 88-112
BibTeX
Hash Function Design
-
Shoichi Hirose
,
Je Hong Park
,
Aaram Yun
:
A Simple Variant of the Merkle-Damgård Scheme with a Permutation , ( .ps ). 113-129
BibTeX -
Elena Andreeva
,
Gregory Neven
,
Bart Preneel
,
Thomas Shrimpton
:
Seven-Property-Preserving Iterated Hashing: ROX , ( .ps ). 130-146
BibTeX -
Thomas Ristenpart
,
Thomas Shrimpton
:
How to Build a Hash Function from Any Collision-Resistant Function , ( .ps ). 147-163
BibTeX
Group/Broadcast Cryptography
-
Jens Groth
:
Fully Anonymous Group Signatures Without Random Oracles , ( .ps ). 164-180
BibTeX -
Aggelos Kiayias
,
Yiannis Tsiounis
,
Moti Yung
:
Group Encryption , ( .ps ). 181-199
BibTeX -
Cécile Delerablée
:
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , ( .ps ). 200-215
BibTeX
MAC and Implementation
-
Kan Yasuda
:
Boosting Merkle-Damgård Hashing for Message Authentication , ( .ps ). 216-231
BibTeX -
Goce Jakimoski
,
K. P. Subbalakshmi
:
On Efficient Message Authentication Via Block Cipher Design Techniques , ( .ps ). 232-248
BibTeX -
Jason Yang
,
James Goodman
:
Symmetric Key Cryptography on Modern Graphics Hardware , ( .ps ). 249-264
BibTeX
Multiparty Computation I
-
Matthew Green
,
Susan Hohenberger
:
Blind Identity-Based Encryption and Simulatable Oblivious Transfer , ( .ps ). 265-282
BibTeX -
Matthew K. Franklin
,
Mark Gondree
,
Payman Mohassel
:
Multi-party Indirect Indexing and Applications , ( .ps ). 283-297
BibTeX -
Seung Geol Choi
,
Ariel Elbaz
,
Ari Juels
,
Tal Malkin
,
Moti Yung
:
Two-Party Computing with Encrypted Data , ( .ps ). 298-314
BibTeX
Block Ciphers
-
Lars R. Knudsen
,
Vincent Rijmen
:
Known-Key Distinguishers for Some Block Ciphers , ( .ps ). 315-324
BibTeX -
Jacques Patarin
,
Valérie Nachef
,
Côme Berbain
:
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions , ( .ps ). 325-341
BibTeX -
David Goldenberg
,
Susan Hohenberger
,
Moses Liskov
,
Elizabeth Crump Schwartz
,
Hakan Seyalioglu
:
On Tweaking Luby-Rackoff Blockciphers , ( .ps ). 342-356
BibTeX
Multiparty Computation II
-
Ivan Damgård
,
Yvo Desmedt
,
Matthias Fitzi
,
Jesper Buus Nielsen
:
Secure Protocols with Asymmetric Trust , ( .ps ). 357-375
BibTeX -
Zuzana Beerliová-Trubíniová
,
Martin Hirt
:
Simple and Efficient Perfectly-Secure Asynchronous MPC , ( .ps ). 376-392
BibTeX -
Zuzana Beerliová-Trubíniová
,
Martin Hirt
,
Micha Riser
:
Efficient Byzantine Agreement with Faulty Minority , ( .ps ). 393-409
BibTeX -
Anne Broadbent
,
Alain Tapp
:
Information-Theoretic Security Without an Honest Majority , ( .ps ). 410-426
BibTeX
Foundation
-
Ueli M. Maurer
,
Dominik Raub
:
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations , ( .ps ). 427-443
BibTeX -
Vipul Goyal
,
Ryan Moriarty
,
Rafail Ostrovsky
,
Amit Sahai
:
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions , ( .ps ). 444-459
BibTeX -
Gilles Brassard
,
Anne Broadbent
,
Joseph Fitzsimons
,
Sébastien Gambs
,
Alain Tapp
:
Anonymous Quantum Communication , ( .ps ). 460-473
BibTeX
Invited Talk II
-
Tatsuaki Okamoto
:
Authenticated Key Exchange and Key Encapsulation in the Standard Model , ( .ps ). 474-484
BibTeX
Public Key Encryption
-
Xavier Boyen
:
Miniature CCA2 PK Encryption: Tight Security Without Redundancy , ( .ps ). 485-501
BibTeX -
Ronald Cramer
,
Goichiro Hanaoka
,
Dennis Hofheinz
,
Hideki Imai
,
Eike Kiltz
,
Rafael Pass
,
Abhi Shelat
,
Vinod Vaikuntanathan
:
Bounded CCA2-Secure Encryption , ( .ps ). 502-518
BibTeX -
Rafael Pass
,
Abhi Shelat
,
Vinod Vaikuntanathan
:
Relations Among Notions of Non-malleability for Encryption , ( .ps ). 519-535
BibTeX
Cryptanalysis
-
Florian Mendel
,
Vincent Rijmen
:
Cryptanalysis of the Tiger Hash Function , ( .ps ). 536-550
BibTeX -
Thomas Peyrin
:
Cryptanalysis of Grindahl , ( .ps ). 551-567
BibTeX -
Martin Hell
,
Thomas Johansson
:
A Key Recovery Attack on Edon80 , ( .ps ). 568-581
BibTeX
Author Index