Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2–6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was withdrawn). Each paper was reviewed by at least three members of the Program Committee, while submissions co-authored by a Program Committee member were reviewed by at least ?ve members. (Each PC member could submit at most one paper.) Many high-quality papers were submitted, but due to the relatively small number which could be accepted, many very good papers had to be rejected. After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged). The proceedings contain the revised versions of the accepted papers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents.

Author(s): Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik (auth.), Kaoru Kurosawa (eds.)
Series: Lecture Notes in Computer Science 4833
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 583
Tags: Data Encryption; Systems and Data Security; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Computer Communication Networks; Discrete Mathematics in Computer Science

Front Matter....Pages -
A Kilobit Special Number Field Sieve Factorization....Pages 1-12
When e -th Roots Become Easier Than Factoring....Pages 13-28
Faster Addition and Doubling on Elliptic Curves....Pages 29-50
A Non-interactive Shuffle with Pairing Based Verifiability....Pages 51-67
On Privacy Models for RFID....Pages 68-87
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust....Pages 88-112
A Simple Variant of the Merkle-Damgård Scheme with a Permutation....Pages 113-129
Seven-Property-Preserving Iterated Hashing: ROX....Pages 130-146
How to Build a Hash Function from Any Collision-Resistant Function....Pages 147-163
Fully Anonymous Group Signatures Without Random Oracles....Pages 164-180
Group Encryption....Pages 181-199
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys....Pages 200-215
Boosting Merkle-Damgård Hashing for Message Authentication....Pages 216-231
On Efficient Message Authentication Via Block Cipher Design Techniques....Pages 232-248
Symmetric Key Cryptography on Modern Graphics Hardware....Pages 249-264
Blind Identity-Based Encryption and Simulatable Oblivious Transfer....Pages 265-282
Multi-party Indirect Indexing and Applications....Pages 283-297
Two-Party Computing with Encrypted Data....Pages 298-314
Known-Key Distinguishers for Some Block Ciphers....Pages 315-324
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions....Pages 325-341
On Tweaking Luby-Rackoff Blockciphers....Pages 342-356
Secure Protocols with Asymmetric Trust....Pages 357-375
Simple and Efficient Perfectly-Secure Asynchronous MPC....Pages 376-392
Efficient Byzantine Agreement with Faulty Minority....Pages 393-409
Information-Theoretic Security Without an Honest Majority....Pages 410-426
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations....Pages 427-443
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions....Pages 444-459
Anonymous Quantum Communication....Pages 460-473
Authenticated Key Exchange and Key Encapsulation in the Standard Model....Pages 474-484
Miniature CCA2 PK Encryption: Tight Security Without Redundancy....Pages 485-501
Bounded CCA2-Secure Encryption....Pages 502-518
Relations Among Notions of Non-malleability for Encryption....Pages 519-535
Cryptanalysis of the Tiger Hash Function....Pages 536-550
Cryptanalysis of Grindahl ....Pages 551-567
A Key Recovery Attack on Edon80....Pages 568-581
Back Matter....Pages -