Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security
Preface and frontmatter
Page
Title
1-20
Finding SHA-1 Characteristics: General Results and Applications
21-36
Improved Collision Search for SHA-0
37-53
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
54-68
New Guess-and-Determine Attack on the Self-Shrinking Generator
69-83
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
84-98
Construction and Analysis of Boolean Functions of 2
t
+1 Variables with Maximum Algebraic Immunity
99-113
Secure Sketch for Biometric Templates
114-129
The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography
130-144
Extending Scalar Multiplication Using Double Bases
145-160
HIBE With Short Public Parameters Without Random Oracle
161-177
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
178-193
On the Generic Construction of Identity-Based Signatures with Additional Properties
194-209
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
210-225
On the Security of OAEP
226-240
Relationship Between Standard Model Plaintext Awareness and Message Hiding
241-251
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms
252-266
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption
267-282
A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants
283-298
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
299-314
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
315-331
Combining Compression Functions and Block Cipher-Based Hash Functions
332-347
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
348-363
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
364-379
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
380-395
KFC - The Krazy Feistel Cipher
396-411
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions
412-427
New Cryptanalytic Results on IDEA
428-443
New Approach for Selectively Convertible Undeniable Signature Schemes
444-459
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
460-466
Analysis of One Popular Group Signature Scheme