Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4833

ISBN: 3540768998, 9783540768999

Size: 5 MB (5728601 bytes)

Pages: 583/593

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik (auth.), Kaoru Kurosawa (eds.)3540768998, 9783540768999

ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2–6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was withdrawn). Each paper was reviewed by at least three members of the Program Committee, while submissions co-authored by a Program Committee member were reviewed by at least ?ve members. (Each PC member could submit at most one paper.) Many high-quality papers were submitted, but due to the relatively small number which could be accepted, many very good papers had to be rejected. After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged). The proceedings contain the revised versions of the accepted papers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents.

Table of contents :
Front Matter….Pages –
A Kilobit Special Number Field Sieve Factorization….Pages 1-12
When e -th Roots Become Easier Than Factoring….Pages 13-28
Faster Addition and Doubling on Elliptic Curves….Pages 29-50
A Non-interactive Shuffle with Pairing Based Verifiability….Pages 51-67
On Privacy Models for RFID….Pages 68-87
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust….Pages 88-112
A Simple Variant of the Merkle-Damgård Scheme with a Permutation….Pages 113-129
Seven-Property-Preserving Iterated Hashing: ROX….Pages 130-146
How to Build a Hash Function from Any Collision-Resistant Function….Pages 147-163
Fully Anonymous Group Signatures Without Random Oracles….Pages 164-180
Group Encryption….Pages 181-199
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys….Pages 200-215
Boosting Merkle-Damgård Hashing for Message Authentication….Pages 216-231
On Efficient Message Authentication Via Block Cipher Design Techniques….Pages 232-248
Symmetric Key Cryptography on Modern Graphics Hardware….Pages 249-264
Blind Identity-Based Encryption and Simulatable Oblivious Transfer….Pages 265-282
Multi-party Indirect Indexing and Applications….Pages 283-297
Two-Party Computing with Encrypted Data….Pages 298-314
Known-Key Distinguishers for Some Block Ciphers….Pages 315-324
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions….Pages 325-341
On Tweaking Luby-Rackoff Blockciphers….Pages 342-356
Secure Protocols with Asymmetric Trust….Pages 357-375
Simple and Efficient Perfectly-Secure Asynchronous MPC….Pages 376-392
Efficient Byzantine Agreement with Faulty Minority….Pages 393-409
Information-Theoretic Security Without an Honest Majority….Pages 410-426
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations….Pages 427-443
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions….Pages 444-459
Anonymous Quantum Communication….Pages 460-473
Authenticated Key Exchange and Key Encapsulation in the Standard Model….Pages 474-484
Miniature CCA2 PK Encryption: Tight Security Without Redundancy….Pages 485-501
Bounded CCA2-Secure Encryption….Pages 502-518
Relations Among Notions of Non-malleability for Encryption….Pages 519-535
Cryptanalysis of the Tiger Hash Function….Pages 536-550
Cryptanalysis of Grindahl ….Pages 551-567
A Key Recovery Attack on Edon80….Pages 568-581
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings”
Shopping Cart
Scroll to Top