ASIACRYPT A

31 papers

YearTitle / Authors
2006A Scalable Password-Based Group Key Exchange Protocol in the Standard Model.
Michel Abdalla, David Pointcheval
2006A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants.
Ellen Jochemsz, Alexander May
2006A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols.
Ventzislav Nikov, Svetla Nikova, Bart Preneel
2006Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings
Xuejia Lai, Kefei Chen
2006Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution.
Satoshi Obana, Toshinori Araki
2006Analysis of One Popular Group Signature Scheme.
Zhengjun Cao
2006Combining Compression Functions and Block Cipher-Based Hash Functions.
Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw
2006Construction and Analysis of Boolean Functions of 2
Na Li, Wen-Feng Qi
2006Extending Scalar Multiplication Using Double Bases.
Roberto Maria Avanzi, Vassil S. Dimitrov, Christophe Doche, Francesco Sica
2006Finding SHA-1 Characteristics: General Results and Applications.
Christophe De Cannière, Christian Rechberger
2006Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.
Scott Contini, Yiqun Lisa Yin
2006Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.
Nuttapong Attrapadung, Jun Furukawa, Hideki Imai
2006Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions.
Jacques Patarin, Valérie Nachef, Côme Berbain
2006HIBE With Short Public Parameters Without Random Oracle.
Sanjit Chatterjee, Palash Sarkar
2006Improved Collision Search for SHA-0.
Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
2006Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung
2006KFC - The Krazy Feistel Cipher.
Thomas Baignères, Matthieu Finiasz
2006Multi-Property-Preserving Hash Domain Extension and the EMD Transform.
Mihir Bellare, Thomas Ristenpart
2006New Approach for Selectively Convertible Undeniable Signature Schemes.
Kaoru Kurosawa, Tsuyoshi Takagi
2006New Cryptanalytic Results on IDEA.
Eli Biham, Orr Dunkelman, Nathan Keller
2006New Guess-and-Determine Attack on the Self-Shrinking Generator.
Bin Zhang, Dengguo Feng
2006On the (In)security of Stream Ciphers Based on Arrays and Modular Addition.
Souradyuti Paul, Bart Preneel
2006On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms.
Gregor Leander, Andy Rupp
2006On the Generic Construction of Identity-Based Signatures with Additional Properties.
David Galindo, Javier Herranz, Eike Kiltz
2006On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
2006On the Security of OAEP.
Alexandra Boldyreva, Marc Fischlin
2006Relationship Between Standard Model Plaintext Awareness and Message Hiding.
Isamu Teranishi, Wakaha Ogata
2006Secure Sketch for Biometric Templates.
Qiming Li, Yagiz Sutcu, Nasir D. Memon
2006Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures.
Jens Groth
2006The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography.
Pierrick Gaudry, T. Houtmann, David R. Kohel, Christophe Ritzenthaler, A. Weng
2006Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption.
Pascal Paillier, Jorge Luis Villar