ASIACRYPT2006

 


        Aisacrypt 2006 list of accepted papers

1.        Efficient Selectively Convertible Undeniable Signature Without Random Oracle

Kaoru Kurosawa and Tsuyoshi Takagi

 

2.        Secure Sketch for Biometric Templates

Qiming Li and Yagiz Sutcu and Nasir Memon

 

3.        Analysis of One Popular Group Signature Scheme

Zhengjun Cao

 

4.        Relationship between standard model plaintext awareness and message hiding

Isamu Teranishi and Wakaha Ogata

 

5.        On the Security of OAEP

Alexandra Boldyreva and Marc Fischlin

 

6.        KFC - the Krazy Feistel Cipher

Thomas Baignères and Matthieu Finiasz

 

7.        Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions

J.Patarin, V.Nachef, and C.Berbain

 

8.        Almost Optimum Secret Sharing Schemes Secure against Cheating for Arbitrary Secret Distribution

Satoshi Obana and Toshinori Araki

 

9.        New Guess-and-Determine Attack on the Self-Shrinking Generator

Bin Zhang, Dengguo Feng

 

10.    Simulation-Sound Non-interactive Zero-Knowledge Proofs for a Practical Language and Constant Size Group Signatures

Jens Groth

 

11.    Forgery and Partial Key Recovery Attacks on HMAC and NMAC Using Hash Collisions (was: Related-Key Attacks on NMAC-MD5)

Scott Contini and Yiqun Lisa Yin

 

12.    Improved Collision Search for SHA-0

Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro and Kazuo Ohta

 

13.    On the Provable Security of an Efficient RSA-Based Pseudorandom Generator

Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang

 

14.    HIBE with Short Public Parameters Secure in the Full Model Without Random Oracle

Sanjit Chatterjee and Palash Sarkar

 

15.    Combining Compression Functions and Block Cipher-Based Hash

Thomas Peyrin, Henri Gilbert, Frédéric Muller and Matt Robshaw

 

16.    Construction and Analysis of Boolean Functions of $2t+1$ Variables with Maximum Algebraic Immunity

Na Li and Wen-Feng Qi

 

17.    New Cryptanalytic Results on IDEA

Eli Biham and Orr Dunkelman and Nathan Keller

 

18.    The $2$-adic CM method for genus 2 curves with application to cryptography

Pierrick Gaudry, Thomas Houtmann, David Kohel, Christophe Ritzenthaler, Annegret Weng

 

19.    Extending Scalar Multiplication using Double Bases

Roberto Avanzi, Vassil Dimitrov, Christophe Doche, Francesco Sica

 

20.    On the Generic Construction of Identity-Based Signatures with Additional Properties

David Galindo and Javier Herranz and Eike Kiltz

 

21.    A Scalable Password-based Group Key Exchange Protocol in the Standard Model

Michel Abdalla and David Pointcheval

 

22.    A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols

Ventzislav Nikov, Svetla Nikova, Bart Preneel

 

23.    Multi-Property-Preserving Hash Domain Extension and the EMD Transform

Mihir Bellare and Thomas Ristenpart

 

24.    A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants

Ellen Jochemsz and Alexander May

 

25.    Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys

Nuttapong Attrapadung, Jun Furukawa, Hideki Imai

 

26.    On the (In)security of Stream Ciphers Based on Arrays and Modular Addition

Souradyuti Paul and Bart Preneel

 

27.    On the Equivalence of RSA and Factoring w.r.t. Generic Ring Algorithms

Gregor Leander and Andy Rupp

 

28.    Trading One-Wayness against Chosen-Ciphertext Security in Factoring-Based Encryption

Pascal Paillier and Jorge L. Villar

 

29.    Indifferentiable Security Analysis of Popular Hash Function with prefix-free padding

Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung,

 

30.    Finding SHA-1 Characteristics

Christophe De Cannière and Christian Rechberger


Maintained by: Lab for Cryptography & Information Security
@ 2006 Asiacrypt2006-SJTU. All rights reserved