© 2006

Advances in Cryptology – ASIACRYPT 2006

12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

  • Xuejia Lai
  • Kefei Chen
Conference proceedings ASIACRYPT 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4284)

Table of contents

  1. Front Matter
  2. Attacks on Hash Functions

    1. Christophe De Cannière, Christian Rechberger
      Pages 1-20
    2. Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
      Pages 21-36
  3. Stream Ciphers and Boolean Functions

  4. Biometrics and ECC Computation

    1. Qiming Li, Yagiz Sutcu, Nasir Memon
      Pages 99-113
    2. P. Gaudry, T. Houtmann, D. Kohel, C. Ritzenthaler, A. Weng
      Pages 114-129
    3. Roberto Avanzi, Vassil Dimitrov, Christophe Doche, Francesco Sica
      Pages 130-144
  5. ID-Based Schemes

    1. Sanjit Chatterjee, Palash Sarkar
      Pages 145-160
    2. Nuttapong Attrapadung, Jun Furukawa, Hideki Imai
      Pages 161-177
    3. David Galindo, Javier Herranz, Eike Kiltz
      Pages 178-193
  6. Public-Key Schemes

    1. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
      Pages 194-209
    2. Alexandra Boldyreva, Marc Fischlin
      Pages 210-225
  7. RSA and Factorization

  8. Construction of Hash Function

    1. Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung
      Pages 283-298

About these proceedings


Information Variable algorithm algorithms anonymithy biometrics block ciphers calculus cryptanalysis cryptographic attacks cryptology data security digital signature schemes information theory security

Editors and affiliations

  • Xuejia Lai
    • 1
  • Kefei Chen
    • 1
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking