We use cookies to provide essential features and services. By using our website you agree to our use of cookies .


Warehouse Stock Clearance Sale

Grab a bargain today!

Advances in Cryptology - Asiacrypt 2006


Product Description
Product Details

Table of Contents

Attacks on Hash Functions.- Finding SHA-1 Characteristics: General Results and Applications.- Improved Collision Search for SHA-0.- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.- Stream Ciphers and Boolean Functions.- New Guess-and-Determine Attack on the Self-Shrinking Generator.- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition.- Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity.- Biometrics and ECC Computation.- Secure Sketch for Biometric Templates.- The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography.- Extending Scalar Multiplication Using Double Bases.- ID-Based Schemes.- HIBE With Short Public Parameters Without Random Oracle.- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.- On the Generic Construction of Identity-Based Signatures with Additional Properties.- Public-Key Schemes.- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.- On the Security of OAEP.- Relationship Between Standard Model Plaintext Awareness and Message Hiding.- RSA and Factorization.- On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms.- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption.- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants.- Construction of Hash Function.- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.- Multi-Property-Preserving Hash Domain Extension and the EMD Transform.- Combining Compression Functions and Block Cipher-Based Hash Functions.- Protocols.- A Scalable Password-Based Group Key Exchange Protocol in the Standard Model.- A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols.- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution.- Block Ciphers.- KFC - The Krazy Feistel Cipher.- Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions.- New Cryptanalytic Results on IDEA.- Signatures.- New Approach for Selectively Convertible Undeniable Signature Schemes.- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures.- Analysis of One Popular Group Signature Scheme.

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
People also searched for
Item ships from and is sold by Fishpond World Ltd.
Back to top