|
|
Aisacrypt 2006 list of accepted papers 1.
Efficient
Selectively Convertible Undeniable Signature Without Random Oracle Kaoru
Kurosawa and Tsuyoshi Takagi 2.
Secure Sketch
for Biometric Templates Qiming
Li and Yagiz Sutcu and Nasir Memon 3.
Analysis of
One Popular Group Signature Scheme Zhengjun
Cao 4. Relationship between standard model plaintext awareness and message hiding Isamu
Teranishi and Wakaha Ogata 5.
On the
Security of OAEP Alexandra
Boldyreva and Marc Fischlin 6.
KFC -
the Krazy Feistel Cipher Thomas
Baignères and Matthieu Finiasz 7.
Generic
Attacks on Unbalanced Feistel Schemes with Contracting Functions J.Patarin,
V.Nachef, and C.Berbain 8.
Almost Optimum
Secret Sharing Schemes Secure against Cheating for Arbitrary Secret
Distribution Satoshi
Obana and Toshinori Araki 9.
New
Guess-and-Determine Attack on the Self-Shrinking Generator Bin
Zhang, Dengguo Feng 10.
Simulation-Sound
Non-interactive Zero-Knowledge Proofs for a Practical Language and
Constant Size Group Signatures Jens
Groth 11.
Forgery and
Partial Key Recovery Attacks on HMAC and NMAC Using Hash Collisions
(was: Related-Key Attacks on NMAC-MD5) Scott
Contini and Yiqun Lisa Yin 12.
Improved
Collision Search for SHA-0 Yusuke
Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro and
Kazuo Ohta 13.
On the
Provable Security of an Efficient RSA-Based Pseudorandom Generator Ron
Steinfeld and Josef Pieprzyk and Huaxiong Wang 14.
HIBE with
Short Public Parameters Secure in the Full Model Without Random
Oracle Sanjit
Chatterjee and Palash Sarkar 15.
Combining
Compression Functions and Block Cipher-Based Hash Thomas
Peyrin, Henri Gilbert, Frédéric Muller and Matt Robshaw 16.
Construction
and Analysis of Boolean Functions of $2t+1$ Variables with Maximum
Algebraic Immunity Na
Li and Wen-Feng Qi 17.
New
Cryptanalytic Results on IDEA Eli
Biham and Orr Dunkelman and Nathan Keller 18.
The $2$-adic
CM method for genus 2 curves with application to cryptography Pierrick
Gaudry, Thomas Houtmann, David Kohel, Christophe Ritzenthaler,
Annegret Weng 19.
Extending
Scalar Multiplication using Double Bases Roberto
Avanzi, Vassil Dimitrov, Christophe Doche, Francesco Sica 20.
On the
Generic Construction of Identity-Based Signatures with Additional
Properties David
Galindo and Javier Herranz and Eike Kiltz 21.
A Scalable
Password-based Group Key Exchange Protocol in the Standard Model Michel
Abdalla and David Pointcheval 22.
A Weakness in
Some Oblivious Transfer and Zero-Knowledge Protocols Ventzislav
Nikov, Svetla Nikova, Bart Preneel 23.
Multi-Property-Preserving
Hash Domain Extension and the EMD Transform Mihir
Bellare and Thomas Ristenpart 24.
A Strategy for
Finding Roots of Multivariate Polynomials with New Applications in
Attacking RSA Variants Ellen
Jochemsz and Alexander May 25.
Forward-Secure
and Searchable Broadcast Encryption with Short Ciphertexts and
Private Keys Nuttapong
Attrapadung, Jun Furukawa, Hideki Imai 26.
On the
(In)security of Stream Ciphers Based on Arrays and Modular Addition Souradyuti
Paul and Bart Preneel 27.
On the
Equivalence of RSA and Factoring w.r.t. Generic Ring Algorithms Gregor
Leander and Andy Rupp 28.
Trading One-Wayness
against Chosen-Ciphertext Security in Factoring-Based Encryption Pascal
Paillier and Jorge L. Villar 29.
Indifferentiable
Security Analysis of Popular Hash Function with prefix-free padding Donghoon
Chang, Sangjin Lee, Mridul Nandi, Moti Yung, 30.
Finding SHA-1
Characteristics Christophe De Cannière and Christian Rechberger |
Maintained by: Lab for Cryptography & Information Security
@ 2006 Asiacrypt2006-SJTU. All rights reserved