Skip to main content
  • Conference proceedings
  • © 2005

Advances in Cryptology – ASIACRYPT 2005

11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3788)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (37 papers)

  1. Front Matter

  2. Algebra and Number Theory

    1. Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?

      • David Jao, Stephen D. Miller, Ramarathnam Venkatesan
      Pages 21-40
    2. Adapting Density Attacks to Low-Weight Knapsacks

      • Phong Q. Nguyễn, Jacques Stern
      Pages 41-58
    3. Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains

      • Vassil Dimitrov, Laurent Imbert, Pradeep Kumar Mishra
      Pages 59-78
  3. Zero Knowledge and Secret Sharing

    1. Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes

      • Zhifang Zhang, Mulan Liu, Liangliang Xiao
      Pages 156-173
    2. Updatable Zero-Knowledge Databases

      • Moses Liskov
      Pages 174-198
  4. Information and Quantum Theory

    1. Quantum Anonymous Transmissions

      • Matthias Christandl, Stephanie Wehner
      Pages 217-235
  5. Privacy and Anonymity

    1. Privacy-Preserving Graph Algorithms in the Semi-honest Model

      • Justin Brickell, Vitaly Shmatikov
      Pages 236-252
    2. Spreading Alerts Quietly and the Subgroup Escape Problem

      • James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy
      Pages 253-272
    3. Universally Anonymizable Public-Key Encryption

      • Ryotaro Hayashi, Keisuke Tanaka
      Pages 293-312
  6. Cryptanalytic Techniques

    1. Fast Computation of Large Distributions and Its Cryptographic Applications

      • Alexander Maximov, Thomas Johansson
      Pages 313-332
    2. An Analysis of the XSL Algorithm

      • Carlos Cid, Gaëtan Leurent
      Pages 333-352
  7. Stream Cipher Cryptanalysis

    1. New Applications of Time Memory Data Tradeoffs

      • Jin Hong, Palash Sarkar
      Pages 353-372

Other Volumes

  1. Advances in Cryptology - ASIACRYPT 2005

Editors and Affiliations

  • Applied Statistics Unit, Indian Statistical Institute, Kolkata, India

    Bimal Roy

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access