This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2006, held in Shanghai, China in December 2006.
The 30 revised full papers presented were carefully reviewed and selected from 314 submissions. The papers are organized in topical sections on attacks on hash functions, stream ciphers and boolean functions, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.
Author(s): Christophe De Cannière, Christian Rechberger (auth.), Xuejia Lai, Kefei Chen (eds.)
Series: Lecture Notes in Computer Science 4284 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 470
Tags: Data Encryption; Systems and Data Security; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Computer Communication Networks; Discrete Mathematics in Computer Science
Front Matter....Pages -
Finding SHA-1 Characteristics: General Results and Applications....Pages 1-20
Improved Collision Search for SHA-0....Pages 21-36
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions....Pages 37-53
New Guess-and-Determine Attack on the Self-Shrinking Generator....Pages 54-68
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition....Pages 69-83
Construction and Analysis of Boolean Functions of 2 t +1 Variables with Maximum Algebraic Immunity....Pages 84-98
Secure Sketch for Biometric Templates....Pages 99-113
The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography....Pages 114-129
Extending Scalar Multiplication Using Double Bases....Pages 130-144
HIBE With Short Public Parameters Without Random Oracle....Pages 145-160
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys....Pages 161-177
On the Generic Construction of Identity-Based Signatures with Additional Properties....Pages 178-193
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator....Pages 194-209
On the Security of OAEP....Pages 210-225
Relationship Between Standard Model Plaintext Awareness and Message Hiding....Pages 226-240
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms....Pages 241-251
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption....Pages 252-266
A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants....Pages 267-282
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding....Pages 283-298
Multi-Property-Preserving Hash Domain Extension and the EMD Transform....Pages 299-314
Combining Compression Functions and Block Cipher-Based Hash Functions....Pages 315-331
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model....Pages 332-347
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols....Pages 348-363
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution....Pages 364-379
KFC – The Krazy Feistel Cipher....Pages 380-395
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions....Pages 396-411
New Cryptanalytic Results on IDEA....Pages 412-427
New Approach for Selectively Convertible Undeniable Signature Schemes....Pages 428-443
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures....Pages 444-459
Analysis of One Popular Group Signature Scheme....Pages 460-466
Back Matter....Pages -