Advances in Cryptology – ASIACRYPT 2007

13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings

  • Editors
  • Kaoru Kurosawa
Conference proceedings ASIACRYPT 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4833)

Table of contents

  1. Front Matter
  2. Number Theory and Elliptic Curve

    1. Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik
      Pages 1-12
    2. Antoine Joux, David Naccache, Emmanuel Thomé
      Pages 13-28
    3. Daniel J. Bernstein, Tanja Lange
      Pages 29-50
  3. Protocol

  4. Invited Talk I

    1. Hash Function Design

      1. Shoichi Hirose, Je Hong Park, Aaram Yun
        Pages 113-129
      2. Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
        Pages 130-146
      3. Thomas Ristenpart, Thomas Shrimpton
        Pages 147-163
    2. Group/Broadcast Cryptography

      1. Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
        Pages 181-199
    3. MAC and Implementation

  5. Multiparty Computation I

    1. Matthew Green, Susan Hohenberger
      Pages 265-282
    2. Matthew Franklin, Mark Gondree, Payman Mohassel
      Pages 283-297
    3. Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
      Pages 298-314
    4. Block Ciphers

      1. Lars R. Knudsen, Vincent Rijmen
        Pages 315-324
      2. Jacques Patarin, Valérie Nachef, Côme Berbain
        Pages 325-341
      3. David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu
        Pages 342-356
  6. Multiparty Computation II

    1. Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen
      Pages 357-375
    2. Zuzana Beerliová-Trubíniová, Martin Hirt
      Pages 376-392
    3. Zuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser
      Pages 393-409
    4. Anne Broadbent, Alain Tapp
      Pages 410-426
    5. Foundation

      1. Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
        Pages 444-459
      2. Gilles Brassard, Anne Broadbent, Joseph Fitzsimons, Sébastien Gambs, Alain Tapp
        Pages 460-473
  7. Invited Talk II

    1. Public Key Encryption

      1. Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass et al.
        Pages 502-518
      2. Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
        Pages 519-535
    2. Cryptanalysis

      1. Florian Mendel, Vincent Rijmen
        Pages 536-550
      2. Thomas Peyrin
        Pages 551-567
      3. Martin Hell, Thomas Johansson
        Pages 568-581
  8. Back Matter

About these proceedings


ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2–6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was withdrawn). Each paper was reviewed by at least three members of the Program Committee, while submissions co-authored by a Program Committee member were reviewed by at least ?ve members. (Each PC member could submit at most one paper.) Many high-quality papers were submitted, but due to the relatively small number which could be accepted, many very good papers had to be rejected. After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged). The proceedings contain the revised versions of the accepted papers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents.


Public Key anonymity block ciphers computational algebra cryptanalysis cryptographic protocols cryptography cryptology data security digital signature schemes elliptic curves group signatures hash functions information number theory

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-76899-9
  • Online ISBN 978-3-540-76900-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site