ISBN: 3540414045
TITLE: Advances in Cryptology - ASIACRYPT 2000
AUTHOR: Okamoto, Tatsuaki (Ed.)
TOC:

Cryptanalysis I
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers 1
Alex Biryukov, Adi Shamir
Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99 14
Glenn Durfee, Phong Q. Nguyen
Why Textbook ElGamal and RSA Encryption Are Insecure 30
Dan Boneh, Antoine Joux, Phong Q. Nguyen
Cryptanalysis of the TTM Cryptosystem 44
Louis Goubin, Nicolas T. Courtois
Attackingand RepairingBatch Verification Schemes 58
Colin Boyd, Chris Pavlovski
IACR Distinguished Lecture
Cryptography Everywhere 72
Thomas A. Berson
Digital Signatures
Security of Signed ElGamal Encryption 73
Claus P. Schnorr, Markus Jakobsson
From Fixed-Length to Arbitrary-Length RSA Padding Schemes 90
Jean-Sbastien Coron, Francois Koeune, David Naccache
Towards Signature-Only Signature Schemes 97
Adam Young, Moti Yung
A New Forward-Secure Digital Signature Scheme 116
Michel Abdalla, Leonid Reyzin
Unconditionally Secure Digital Signature Schemes Admitting Transferability 130
Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
Protocols I
Efficient Secure Multi-party Computation 143
Martin Hirt, Ueli Maurer, Bartosz Przydatek
Mix and Match: Secure Function Evaluation via Ciphertexts 162
Markus Jakobsson, Ari Juels
A Length-Invariant Hybrid Mix 178
Miyako Ohkubo, Masayuki Abe
Attack for Flash MIX 192
Masashi Mitomo, Kaoru Kurosawa
Distributed Oblivious Transfer 205
Moni Naor, Benny Pinkas
Number Theoretic Algorithms
Key Improvements to XTR220
Arjen K. Lenstra, Eric R. Verheul
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders 234
Safuat Hamdy, Bodo Mller
Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three 248
Seigo Arita
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems 259
Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shigeo Tsujii
Symmetric-Key Schemes I
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis 274
Jaechul Sung, Sangjin Lee, Jongin Lim, Seokhie Hong, Sangjoon Park
On the Pseudorandomness of Top-Level Schemes of Block Ciphers 289
Shiho Moriai, Serge Vaudenay
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers 303
Philip Hawkes, Gregory G. Rose
Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography 317
Mihir Bellare, Phillip Rogaway
Protocols II
Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes 331
Jan Camenisch, Ivan Damgrd
Addition of ElGamal Plaintexts 346
Markus Jakobsson, Ari Juels
Improved Methods to Perform Threshold RSA 359
Brian King
Commital Deniable Proofs and Electronic Campaign Finance 373
Matt Franklin, Tomas Sander
Provably Secure Metering Scheme 388
Wakaha Ogata, Kaoru Kurosawa
Invited Lecture
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government -399
Hideki Imai, Atsuhiro Yamagishi
Fingerprinting
Anonymous Fingerprinting with Direct Non-repudiation 401
Birgit Pfitzmann, Ahmad-Reza Sadeghi
Efficient Anonymous Fingerprinting with Group Signatures 415
Jan Camenisch
Zero-Knowledge and Provable Security
Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof Systems 429
Danny Gutfreund, Michael Ben-Or
Zero-Knowledge and Code Obfuscation 443
Satoshi Hada
A Note on Security Proofs in the Generic Model 458
Marc Fischlin
Boolean Functions
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity 470
Yuliang Zheng, Xian-Mo Zhang
Cryptanalysis II
Cryptanalysis of the Yi-Lam Hash 483
David Wagner
Power Analysis, What Is Now Possible 489
Mehdi-Laurent Akkar, Rgis Bevan, Paul Dischamp, Didier Moyart
Pseudorandomness
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications 503
Anand Desai, Sara Miner
Symmetric-Key Schemes II
The Security of Chaffing and Winnowing 517
Mihir Bellare, Alexandra Boldyreva
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm 531
Mihir Bellare, Chanathip Namprempre
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques 546
Michel Abdalla, Mihir Bellare
Proofs of Security for the Unix Password Hashing Algorithm 560
David Wagner, Ian Goldberg
Public-Key Encryption and Key Distribution
Trapdooring Discrete Logarithms on Elliptic Curves over Rings 573
Pascal Paillier
Strengthening McEliece Cryptosystem 585
Pierre Loidreau
Password-Authenticated Key Exchange Based on RSA 599
Philip MacKenzie, Sarvar Patel, Ram Swaminathan
Round-Efficient Conference Key Agreement Protocols with Provable Security 614
Wen-Guey Tzeng, Zhi-Jia Tzeng
Author Index 629
END
