Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of asiacrypt 2007
Preface and frontmatter
Page
Title
1-12
A Kilobit Special Number Field Sieve Factorization
13-28
When
e
-th Roots Become Easier Than Factoring
29-50
Faster Addition and Doubling on Elliptic Curves
51-67
A Non-interactive Shuffle with Pairing Based Verifiability
68-87
On Privacy Models for RFID
88-112
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust
113-129
A Simple Variant of the Merkle-Damgård Scheme with a Permutation
130-146
Seven-Property-Preserving Iterated Hashing: ROX
147-163
How to Build a Hash Function from Any Collision-Resistant Function
164-180
Fully Anonymous Group Signatures Without Random Oracles
181-199
Group Encryption
200-215
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
216-231
Boosting Merkle-Damgård Hashing for Message Authentication
232-248
On Efficient Message Authentication Via Block Cipher Design Techniques
249-264
Symmetric Key Cryptography on Modern Graphics Hardware
265-282
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
283-297
Multi-party Indirect Indexing and Applications
298-314
Two-Party Computing with Encrypted Data
315-324
Known-Key Distinguishers for Some Block Ciphers
325-341
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
342-356
On Tweaking Luby-Rackoff Blockciphers
357-375
Secure Protocols with Asymmetric Trust
376-392
Simple and Efficient Perfectly-Secure Asynchronous MPC
393-409
Efficient Byzantine Agreement with Faulty Minority
410-426
Information-Theoretic Security Without an Honest Majority
427-443
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
444-459
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
460-473
Anonymous Quantum Communication
474-484
Authenticated Key Exchange and Key Encapsulation in the Standard Model
485-501
Miniature CCA2 PK Encryption: Tight Security Without Redundancy
502-518
Bounded CCA2-Secure Encryption
519-535
Relations Among Notions of Non-malleability for Encryption
536-550
Cryptanalysis of the Tiger Hash Function
551-567
Cryptanalysis of Grindahl
568-581
A Key Recovery Attack on Edon80