


default search action
ASIACRYPT 2006: Shanghai, China
- Xuejia Lai, Kefei Chen: 
 Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings. Lecture Notes in Computer Science 4284, Springer 2006, ISBN 3-540-49475-8
Attacks on Hash Functions
- Christophe De Cannière, Christian Rechberger: 
 Finding SHA-1 Characteristics: General Results and Applications. 1-20
- Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima  , Noboru Kunihiro , Noboru Kunihiro , Kazuo Ohta: , Kazuo Ohta:
 Improved Collision Search for SHA-0. 21-36
- Scott Contini, Yiqun Lisa Yin: 
 Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. 37-53
Stream Ciphers and Boolean Functions
- Bin Zhang, Dengguo Feng: 
 New Guess-and-Determine Attack on the Self-Shrinking Generator. 54-68
- Souradyuti Paul, Bart Preneel: 
 On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. 69-83
- Na Li, Wen-Feng Qi: 
 Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity. 84-98
Biometrics and ECC Computation
- Qiming Li, Yagiz Sutcu, Nasir D. Memon  : :
 Secure Sketch for Biometric Templates. 99-113
- Pierrick Gaudry, T. Houtmann, David R. Kohel, Christophe Ritzenthaler, A. Weng: 
 The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography. 114-129
- Roberto Maria Avanzi, Vassil S. Dimitrov, Christophe Doche  , Francesco Sica , Francesco Sica : :
 Extending Scalar Multiplication Using Double Bases. 130-144
ID-Based Schemes
- Sanjit Chatterjee, Palash Sarkar: 
 HIBE With Short Public Parameters Without Random Oracle. 145-160
- Nuttapong Attrapadung, Jun Furukawa, Hideki Imai: 
 Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. 161-177
- David Galindo  , Javier Herranz , Javier Herranz , Eike Kiltz , Eike Kiltz : :
 On the Generic Construction of Identity-Based Signatures with Additional Properties. 178-193
Public-Key Schemes
- Ron Steinfeld, Josef Pieprzyk  , Huaxiong Wang: , Huaxiong Wang:
 On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. 194-209
- Alexandra Boldyreva, Marc Fischlin: 
 On the Security of OAEP. 210-225
- Isamu Teranishi, Wakaha Ogata  : :
 Relationship Between Standard Model Plaintext Awareness and Message Hiding. 226-240
RSA and Factorization
- Gregor Leander  , Andy Rupp: , Andy Rupp:
 On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. 241-251
- Pascal Paillier, Jorge Luis Villar  : :
 Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption. 252-266
- Ellen Jochemsz, Alexander May  : :
 A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants. 267-282
Construction of Hash Function
- Donghoon Chang, Sangjin Lee, Mridul Nandi  , Moti Yung: , Moti Yung:
 Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. 283-298
- Mihir Bellare, Thomas Ristenpart  : :
 Multi-Property-Preserving Hash Domain Extension and the EMD Transform. 299-314
- Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw: 
 Combining Compression Functions and Block Cipher-Based Hash Functions. 315-331
Protocols
- Michel Abdalla  , David Pointcheval , David Pointcheval : :
 A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. 332-347
- Ventzislav Nikov, Svetla Nikova  , Bart Preneel: , Bart Preneel:
 A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. 348-363
- Satoshi Obana, Toshinori Araki: 
 Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. 364-379
Block Ciphers
- Thomas Baignères, Matthieu Finiasz: 
 KFC - The Krazy Feistel Cipher. 380-395
- Jacques Patarin, Valérie Nachef, Côme Berbain: 
 Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. 396-411
- Eli Biham, Orr Dunkelman, Nathan Keller: 
 New Cryptanalytic Results on IDEA. 412-427
Signatures
- Kaoru Kurosawa, Tsuyoshi Takagi: 
 New Approach for Selectively Convertible Undeniable Signature Schemes. 428-443
- Jens Groth  : :
 Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. 444-459
- Zhengjun Cao: 
 Analysis of One Popular Group Signature Scheme. 460-466

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














