LEADER 05829nam 22008895 450 001 9910146617503321 005 20251226195445.0 010 $a3-540-49476-6 024 7 $a10.1007/11935230 035 $a(CKB)1000000000283703 035 $a(SSID)ssj0000315800 035 $a(PQKBManifestationID)11261545 035 $a(PQKBTitleCode)TC0000315800 035 $a(PQKBWorkID)10256692 035 $a(PQKB)10103879 035 $a(DE-He213)978-3-540-49476-8 035 $a(MiAaPQ)EBC3068676 035 $a(PPN)123139767 035 $a(BIP)34164504 035 $a(BIP)13887582 035 $a(EXLCZ)991000000000283703 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology -- ASIACRYPT 2006 $e12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings /$fedited by Xuejia Lai, Kefei Chen 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XIV, 470 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4284 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-49475-8 320 $aIncludes bibliographical references and index. 327 $aAttacks on Hash Functions -- Finding SHA-1 Characteristics: General Results and Applications -- Improved Collision Search for SHA-0 -- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions -- Stream Ciphers and Boolean Functions -- New Guess-and-Determine Attack on the Self-Shrinking Generator -- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition -- Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity -- Biometrics and ECC Computation -- Secure Sketch for Biometric Templates -- The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography -- Extending Scalar Multiplication Using Double Bases -- ID-Based Schemes -- HIBE With Short Public Parameters Without Random Oracle -- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys -- On the Generic Construction of Identity-Based Signatures with Additional Properties -- Public-Key Schemes -- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator -- On the Security of OAEP -- Relationship Between Standard Model Plaintext Awareness and Message Hiding -- RSA and Factorization -- On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms -- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption -- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants -- Construction of Hash Function -- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding -- Multi-Property-Preserving Hash Domain Extension and the EMD Transform -- Combining Compression Functions and Block Cipher-Based Hash Functions -- Protocols -- A Scalable Password-Based Group Key Exchange Protocol in the Standard Model -- AWeakness in Some Oblivious Transfer and Zero-Knowledge Protocols -- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution -- Block Ciphers -- KFC ? The Krazy Feistel Cipher -- Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions -- New Cryptanalytic Results on IDEA -- Signatures -- New Approach for Selectively Convertible Undeniable Signature Schemes -- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures -- Analysis of One Popular Group Signature Scheme. 330 $aThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4284 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aAlgorithms 606 $aElectronic data processing$xManagement 606 $aComputer networks 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aData and Information Security 606 $aAlgorithms 606 $aIT Operations 606 $aComputer Communication Networks 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 0$aAlgorithms. 615 0$aElectronic data processing$xManagement. 615 0$aComputer networks. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 701 $aLai$b Xuejia$01763060 701 $aChen$b Kefei$f1959-$0947887 712 12$aInternational Conference on the Theory and Application of Cryptology and Information Security. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910146617503321 996 $aAdvances in Cryptology -- ASIACRYPT 2006$94521394 997 $aUNINA