skip to content
Advances in cryptology : proceedings Preview this item
ClosePreview this item

Advances in cryptology : proceedings

Author: Kaoru Kurosawa; ASIACRYPT <13, 2007, Kuching>; International Association for Cryptologic Research.
Publisher: Berlin ; Heidelberg New York, NY : Springer, 2007.
Series: Lecture notes in computer science, vol. 4833.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats

Constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this


Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Kongress
Material Type: Conference publication
Document Type: Book
All Authors / Contributors: Kaoru Kurosawa; ASIACRYPT <13, 2007, Kuching>; International Association for Cryptologic Research.
ISBN: 9783540768999 3540768998
OCLC Number: 198962058
Notes: Literaturangaben.
Description: XIV, 581 S. : graph. Darst. ; 24 cm.
Contents: Number Theory and Elliptic Curve.- A Kilobit Special Number Field Sieve Factorization.- When e-th Roots Become Easier Than Factoring.- Faster Addition and Doubling on Elliptic Curves.- Protocol.- A Non-interactive Shuffle with Pairing Based Verifiability.- On Privacy Models for RFID.- Invited Talk I.- Obtaining Universally Compoable Security: Towards the Bare Bones of Trust.- A Simple Variant of the Merkle-Damgard Scheme with a Permutation.- Seven-Property-Preserving Iterated Hashing: ROX.- How to Build a Hash Function from Any Collision-Resistant Function.- Fully Anonymous Group Signatures Without Random Oracles.- Group Encryption.- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys.- Boosting Merkle-Damgard Hashing for Message Authentication.- On Efficient Message Authentication Via Block Cipher Design Techniques.- Symmetric Key Cryptography on Modern Graphics Hardware.- Multiparty Computation I.- Blind Identity-Based Encryption and Simulatable Oblivious Transfer.- Multi-party Indirect Indexing and Applications.- Two-Party Computing with Encrypted Data.- Known-Key Distinguishers for Some Block Ciphers.- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.- On Tweaking Luby-Rackoff Blockciphers.- Multiparty Computation II.- Secure Protocols with Asymmetric Trust.- Simple and Efficient Perfectly-Secure Asynchronous MPC.- Efficient Byzantine Agreement with Faulty Minority.- Information-Theoretic Security Without an Honest Majority.- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations.- Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions.- Anonymous Quantum Communication.- Invited Talk II.- Authenticated Key Exchange and Key Encapsulation in the Standard Model.- Miniature CCA2 PK Encryption: Tight Security Without Redundancy.- Bounded CCA2-Secure Encryption.- Relations Among Notions of Non-malleability for Encryption.- Cryptanalysis of the Tiger Hash Function.- Cryptanalysis of Grindahl.- A Key Recovery Attack on Edon80.
Series Title: Lecture notes in computer science, vol. 4833.
Responsibility: ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Kaoru Kurosawa (ed.). [IACR, International Association for Cryptologic Research].
More information:


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Advances in cryptology : proceedings
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "198962058" ;
   library:placeOfPublication <> ; # New York, NY
   library:placeOfPublication <> ;
   library:placeOfPublication <> ; # Berlin
   library:placeOfPublication <> ; # Heidelberg
   schema:about <> ; # Kuching <2007>
   schema:about <> ; # Kryptoanalyse
   schema:about <> ; # Kryptosystem
   schema:about <> ;
   schema:about <> ; # Kryptologie
   schema:about <> ; # Data encryption
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <> ; # ASIACRYPT <13, 2007, Kuching>
   schema:contributor <> ; # International Association for Cryptologic Research.
   schema:datePublished "2007" ;
   schema:editor <> ; # Kaoru Kurosawa
   schema:exampleOfWork <> ;
   schema:genre "Kongress" ;
   schema:genre "Conference publication"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <> ; # Lecture notes in computer science ;
   schema:name "Advances in cryptology : proceedings" ;
   schema:productID "198962058" ;
   schema:publication <> ;
   schema:publisher <> ; # Springer
   schema:workExample <> ;
   umbel:isLike <> ;
   wdrs:describedby <> ;

Related Entities

<> # Kaoru Kurosawa
    a schema:Person ;
   schema:familyName "Kurosawa" ;
   schema:givenName "Kaoru" ;
   schema:name "Kaoru Kurosawa" ;

<> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <> ; # Advances in cryptology : proceedings
   schema:name "Lecture notes in computer science ;" ;

<> # International Association for Cryptologic Research.
    a schema:Organization ;
   schema:name "International Association for Cryptologic Research." ;

<> # ASIACRYPT <13, 2007, Kuching>
    a schema:Organization ;
   schema:name "ASIACRYPT <13, 2007, Kuching>" ;

    a schema:ProductModel ;
   schema:isbn "3540768998" ;
   schema:isbn "9783540768999" ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.