Advances in Cryptology ¿ ASIACRYPT 2007

13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings

Omschrijving

This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The 33 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 223 submissions. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis. ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2¿6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was withdrawn). Each paper was reviewed by at least three members of the Program Committee, while submissions co-authored by a Program Committee member were reviewed by at least ?ve members. (Each PC member could submit at most one paper.) Many high-quality papers were submitted, but due to the relatively small number which could be accepted, many very good papers had to be rejected. After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged). The proceedings contain the revised versions of the accepted papers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents. Number Theory and Elliptic Curve A Kilobit Special Number Field Sieve Factorization 1 Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, and Dag Arne Osvik When e-th Roots Become Easier Than Factoring 13 Antoine Joux, David Naccache, and Emmanuel Thom TD> Faster Addition and Doubling on Elliptic Curves 29 Daniel J. Bernstein and Tanja Lange Protocol A Non-interactive Shuffle with Pairing Based Verifiability 51 Jens Groth and Steve Lu On Privacy Models for RFID 68 Serge Vaudenay Invited Talk I Obtaining Universally Compoable Security: Towards the Bare Bones of Trust 88 Ran Canetti Hash Function Design A Simple Variant of the Merkle-Danigiird Scheme with a Permutation 113 Shoichi Hirose, Je Hong Park, and Aaram Van Seven-Property-Preserving Iterated lashing: ROX 130 Elena Andreeva, Gregory Neven, Bart Preneel, and Thomas Shrimpton How to Build a Hash Function from Any Collision-Resistant Function 147 Thomas Ristenpart and Thomas Shrimpton Group/Broadcast Cryptography Fully Anonymous Group Signatures Without Random Oracles 164 Jens Groth Group Encryption 181 Aggelos Kiayias, Yiannis Tsiounis, and Moti Yung Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys 200 C le Delerabl /TD> MAC and Implementation Boosting Merkle-Damgard Hashing for Message Authentication 216 Kan Yasuda On Efficient Message Authentication Via Block Cipher Design Techniques 232 G. Jakimoski and K.P. Subbalakshmi Symmetric Key Cryptography on Modern Graphics Hardware 249 Jason Yang and James Goodman Multiparty Computation I Blind Identity-Based Encryption and Simulatable Oblivious Transfer 265 Matthew Green and Susan Hohenberger Multi-party Indirect Indexing and Applications 283 Matthew Franklin. Mark Gondree, and Payman Mohassel Two-Party Computing with Encrypted Data 298 Seung Geol Choi, Ariel Elbaz, Ari fuels, Tal Malkin, and Moti Yang Block Ciphers Known-Key Distinguishers for Some Block Ciphers 315 Lars R. Knudsen and Vincent Rijmen Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions 325 Jacques Patarin, Val e Nachef, and C me Berbain On Tweaking Luby-Rackoff Blockciphers 342 David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Cramp Schwartz, and Hakan Seyalioglu Multiparty Computation II Secure Protocols with Asymmetric Trust 357 Ivan Damg , Yvo Desmedt, Matthias Fitzi, and Jesper Buns Nielsen Simple and Efficient Perfectly-Secure Asynchronous MPC 376 Zuzana Beerliov rubiniov nd Martin Hirt Efficient Byzantine Agreement with Faulty Minority 393 Zuzana Beerliov rubiniov Martin Hirt, and Micha Riser Information-Theoretic Security Without an Honest Majority 410 Anne Broadbent and Alain Tapp Foundation Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations 427 Ueli Maurer and Dominik Raub Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions 444 Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, and Amit Sahai Anonymous Quantum Communication 460 Gilles Brassard, Anne Broadbent, Joseph Fitzsimons, S stien Gambs, and Alain Tapp Invited Talk II Authenticated Key Exchange and Key Encapsulation in the Standard Model 474 Tatsuaki Okamoto Public Key Encryption Miniature CCA2 PK Encryption: Tight Security Without Redundancy 485 Xavier Boyen Bounded CCA2-Secure Encryption 502 Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, and Vinod Vaikuntanathan Relations Among Notions of Non-malleability for Encryption 519 Rafael Pass, Abhi Shelat, and Vinod Vaikuntanathan Cryptanalysis Cryptanalysis of the Tiger Hash Function 536 Florian Mendel and Vincent Rijmen Cryptanalysis of GRINDAHL 551 Thomas Peyrin A Key Recovery Attack on Edon80 568 Martin Hell and Thomas Johansson Author Index 583
€ 112,60
Paperback
 
Gratis verzending vanaf
€ 19,95 binnen Nederland
Schrijver
Titel
Advances in Cryptology ¿ ASIACRYPT 2007
Uitgever
Springer-Verlag GmbH
Jaar
2007
Taal
Engels
Pagina's
604
Gewicht
885 gr
EAN
9783540768999
Afmetingen
235 x 159 x 38 mm
Bindwijze
Paperback

U ontvangt bij ons altijd de laatste druk!


Rubrieken

Boekstra