default search action
1. VIETCRYPT 2006: Hanoi, Vietnam
- Phong Q. Nguyen:
Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4341, Springer 2006, ISBN 3-540-68799-8
Signatures and Lightweight Cryptography
- Aline Gouget, Jacques Patarin:
Probabilistic Multivariate Cryptography. 1-18 - Jean Monnerat, Serge Vaudenay:
Short 2-Move Undeniable Signatures. 19-36 - Matthew J. B. Robshaw:
Searching for Compact Algorithms: cgen. 37-49
Invited Talk
- Tatsuaki Okamoto:
On Pairing-Based Cryptosystems. 50-66
Pairing-Based Cryptography
- Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu:
A New Signature Scheme Without Random Oracles from Bilinear Pairings. 67-80 - Lan Nguyen:
Efficient Dynamic k-Times Anonymous Authentication. 81-98 - Claire Whelan, Michael Scott:
Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure? 99-114
Algorithmic Number Theory
- Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta:
Factorization of Square-Free Integers with High Bits Known. 115-130 - Roberto Maria Avanzi, Francesco Sica:
Scalar Multiplication on Koblitz Curves Using Double Bases. 131-146 - Fumitaka Hoshino, Tetsutaro Kobayashi, Kazumaro Aoki:
Compressed Jacobian Coordinates for OEF. 147-156
Ring Signatures and Group Signatures
- Miyako Ohkubo, Masayuki Abe:
On the Definition of Anonymity for Ring Signatures. 157-174 - Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen:
Escrowed Linkability of Ring Signatures and Its Applications. 175-192 - Cécile Delerablée, David Pointcheval:
Dynamic Fully Anonymous Short Group Signatures. 193-210
Hash Functions
- Phillip Rogaway:
Formalizing Human Ignorance. 211-228 - Arjen K. Lenstra, Dan Page, Martijn Stam:
Discrete Logarithm Variants of VSH. 229-242 - Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Conditions for Hash Functions. 243-259
Cryptanalysis
- Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong:
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. 260-270 - Jianyong Huang, Jennifer Seberry, Willy Susilo:
On the Internal Structure of Alpha-MAC. 271-285 - Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim:
A Weak Key Class of XTEA for a Related-Key Rectangle Attack. 286-297
Key Agreement and Threshold Cryptography
- Jens-Matthias Bohli, Rainer Steinwandt:
Deniable Group Key Agreement. 298-311 - Hossein Ghodosi, Josef Pieprzyk:
An Ideal and Robust Threshold RSA. 312-321 - Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt:
Towards Provably Secure Group Key Agreement Building on Group Theory. 322-336
Public-Key Encryption
- Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto:
Universally Composable Identity-Based Encryption. 337-353 - Duong Hieu Phan:
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate. 354-365 - Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. 366-384
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.