Skip to main content
  • Conference proceedings
  • © 2006

Advances in Cryptology -- ASIACRYPT 2006

12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4284)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

  2. Attacks on Hash Functions

    1. Finding SHA-1 Characteristics: General Results and Applications

      • Christophe De Cannière, Christian Rechberger
      Pages 1-20
    2. Improved Collision Search for SHA-0

      • Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
      Pages 21-36
  3. Biometrics and ECC Computation

    1. Secure Sketch for Biometric Templates

      • Qiming Li, Yagiz Sutcu, Nasir Memon
      Pages 99-113
    2. The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography

      • P. Gaudry, T. Houtmann, D. Kohel, C. Ritzenthaler, A. Weng
      Pages 114-129
    3. Extending Scalar Multiplication Using Double Bases

      • Roberto Avanzi, Vassil Dimitrov, Christophe Doche, Francesco Sica
      Pages 130-144
  4. ID-Based Schemes

    1. HIBE With Short Public Parameters Without Random Oracle

      • Sanjit Chatterjee, Palash Sarkar
      Pages 145-160
    2. Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys

      • Nuttapong Attrapadung, Jun Furukawa, Hideki Imai
      Pages 161-177
    3. On the Generic Construction of Identity-Based Signatures with Additional Properties

      • David Galindo, Javier Herranz, Eike Kiltz
      Pages 178-193
  5. Public-Key Schemes

    1. On the Provable Security of an Efficient RSA-Based Pseudorandom Generator

      • Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
      Pages 194-209
    2. On the Security of OAEP

      • Alexandra Boldyreva, Marc Fischlin
      Pages 210-225
  6. Construction of Hash Function

    1. Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding

      • Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung
      Pages 283-298

Other Volumes

  1. Advances in Cryptology – ASIACRYPT 2006

Editors and Affiliations

  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China

    Xuejia Lai, Kefei Chen

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access