


default search action
1. VIETCRYPT 2006: Hanoi, Vietnam
- Phong Q. Nguyen:

Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4341, Springer 2006, ISBN 3-540-68799-8
Signatures and Lightweight Cryptography
- Aline Gouget, Jacques Patarin:

Probabilistic Multivariate Cryptography. 1-18 - Jean Monnerat, Serge Vaudenay:

Short 2-Move Undeniable Signatures. 19-36 - Matthew J. B. Robshaw:

Searching for Compact Algorithms: cgen. 37-49
Invited Talk
- Tatsuaki Okamoto:

On Pairing-Based Cryptosystems. 50-66
Pairing-Based Cryptography
- Fangguo Zhang

, Xiaofeng Chen, Willy Susilo
, Yi Mu:
A New Signature Scheme Without Random Oracles from Bilinear Pairings. 67-80 - Lan Nguyen:

Efficient Dynamic k-Times Anonymous Authentication. 81-98 - Claire Whelan, Michael Scott:

Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure? 99-114
Algorithmic Number Theory
- Bagus Santoso

, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta:
Factorization of Square-Free Integers with High Bits Known. 115-130 - Roberto Maria Avanzi, Francesco Sica:

Scalar Multiplication on Koblitz Curves Using Double Bases. 131-146 - Fumitaka Hoshino

, Tetsutaro Kobayashi, Kazumaro Aoki:
Compressed Jacobian Coordinates for OEF. 147-156
Ring Signatures and Group Signatures
- Miyako Ohkubo, Masayuki Abe:

On the Definition of Anonymity for Ring Signatures. 157-174 - Sherman S. M. Chow

, Willy Susilo
, Tsz Hon Yuen:
Escrowed Linkability of Ring Signatures and Its Applications. 175-192 - Cécile Delerablée, David Pointcheval

:
Dynamic Fully Anonymous Short Group Signatures. 193-210
Hash Functions
- Phillip Rogaway:

Formalizing Human Ignorance. 211-228 - Arjen K. Lenstra, Dan Page, Martijn Stam:

Discrete Logarithm Variants of VSH. 229-242 - Yu Sasaki, Yusuke Naito, Jun Yajima

, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Conditions for Hash Functions. 243-259
Cryptanalysis
- Kitae Jeong, Jaechul Sung

, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong:
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. 260-270 - Jianyong Huang, Jennifer Seberry, Willy Susilo

:
On the Internal Structure of Alpha-MAC. 271-285 - Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim:

A Weak Key Class of XTEA for a Related-Key Rectangle Attack. 286-297
Key Agreement and Threshold Cryptography
- Jens-Matthias Bohli, Rainer Steinwandt:

Deniable Group Key Agreement. 298-311 - Hossein Ghodosi, Josef Pieprzyk

:
An Ideal and Robust Threshold RSA. 312-321 - Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt:

Towards Provably Secure Group Key Agreement Building on Group Theory. 322-336
Public-Key Encryption
- Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto:

Universally Composable Identity-Based Encryption. 337-353 - Duong Hieu Phan

:
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate. 354-365 - Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura

, Hideki Imai:
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. 366-384

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














