Skip to main content
  • Conference proceedings
  • © 2007

Advances in Cryptology – ASIACRYPT 2007

13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4833)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2007.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

  2. Number Theory and Elliptic Curve

    1. A Kilobit Special Number Field Sieve Factorization

      • Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik
      Pages 1-12
    2. When e-th Roots Become Easier Than Factoring

      • Antoine Joux, David Naccache, Emmanuel Thomé
      Pages 13-28
    3. Faster Addition and Doubling on Elliptic Curves

      • Daniel J. Bernstein, Tanja Lange
      Pages 29-50
  3. Protocol

    1. On Privacy Models for RFID

      • Serge Vaudenay
      Pages 68-87
  4. Invited Talk I

    1. Hash Function Design

      1. A Simple Variant of the Merkle-Damgård Scheme with a Permutation
        • Shoichi Hirose, Je Hong Park, Aaram Yun
        Pages 113-129
      2. Seven-Property-Preserving Iterated Hashing: ROX
        • Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
        Pages 130-146
      3. How to Build a Hash Function from Any Collision-Resistant Function
        • Thomas Ristenpart, Thomas Shrimpton
        Pages 147-163
    2. Group/Broadcast Cryptography

      1. Group Encryption
        • Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
        Pages 181-199
    3. MAC and Implementation

      1. On Efficient Message Authentication Via Block Cipher Design Techniques
        • G. Jakimoski, K. P. Subbalakshmi
        Pages 232-248
      2. Symmetric Key Cryptography on Modern Graphics Hardware
        • Jason Yang, James Goodman
        Pages 249-264
  5. Multiparty Computation I

    1. Blind Identity-Based Encryption and Simulatable Oblivious Transfer

      • Matthew Green, Susan Hohenberger
      Pages 265-282
    2. Multi-party Indirect Indexing and Applications

      • Matthew Franklin, Mark Gondree, Payman Mohassel
      Pages 283-297
    3. Two-Party Computing with Encrypted Data

      • Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
      Pages 298-314
    4. Block Ciphers

      1. Known-Key Distinguishers for Some Block Ciphers
        • Lars R. Knudsen, Vincent Rijmen
        Pages 315-324

Other Volumes

  1. Advances in Cryptology – ASIACRYPT 2007

About this book

ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2–6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was withdrawn). Each paper was reviewed by at least three members of the Program Committee, while submissions co-authored by a Program Committee member were reviewed by at least ?ve members. (Each PC member could submit at most one paper.) Many high-quality papers were submitted, but due to the relatively small number which could be accepted, many very good papers had to be rejected. After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged). The proceedings contain the revised versions of the accepted papers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents.

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access