Last update: Wed Apr 5 15:15:25 MDT 2023
Volume 3928, 2006François-Xavier Standaert and Gilles Piret and Neil Gershenfeld and Jean-Jacques Quisquater SEA: A Scalable Encryption Algorithm for Small Embedded Applications . . . . . . 222--236
S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Front Matter . . . . . . . . . . . . . . ?? S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Front Matter . . . . . . . . . . . . . . 1--1 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Chapter 1: On the Perron Root of Irreducible Matrices . . . . . . . . . . 3--49 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Chapter 2: On the Positive Solution to a Linear System with Nonnegative Coefficients . . . . . . . . . . . . . . 51--68 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Front Matter . . . . . . . . . . . . . . 69--69 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Chapter 3: Introduction . . . . . . . . 71--73 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Chapter 4: Network Model . . . . . . . . 75--89 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Chapter 5: Resource Allocation Problem in Communications Networks . . . . . . . 91--128 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Chapter 6: Power Control Algorithm . . . 129--152 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Front Matter . . . . . . . . . . . . . . 153--153 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Appendix A: Some Concepts and Results from Matrix Analysis . . . . . . . . . . 155--170 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Appendix B: Some Concepts and Results from Convex Analysis . . . . . . . . . . 171--183 S\lawomir Sta\'nczak and Marcin Wiczanowski and Holger Boche Back Matter . . . . . . . . . . . . . . ??
Christophe De Canni\`ere and Christian Rechberger Finding SHA-1 Characteristics: General Results and Applications . . . . . . . . 1--20 Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta Improved Collision Search for SHA-0 . . 21--36 Scott Contini and Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions 37--53 Bin Zhang and Dengguo Feng New Guess-and-Determine Attack on the Self-Shrinking Generator . . . . . . . . 54--68 Souradyuti Paul and Bart Preneel On the (In)security of Stream Ciphers Based on Arrays and Modular Addition . . 69--83 Na Li and Wen-Feng Qi Construction and Analysis of Boolean Functions of $ 2 t + 1 $ Variables with Maximum Algebraic Immunity . . . . . . . 84--98 Qiming Li and Yagiz Sutcu and Nasir Memon Secure Sketch for Biometric Templates 99--113 P. Gaudry and T. Houtmann and D. Kohel and C. Ritzenthaler and A. Weng The $2$-Adic CM Method for Genus $2$ Curves with Application to Cryptography 114--129 Roberto Avanzi and Vassil Dimitrov and Christophe Doche and Francesco Sica Extending Scalar Multiplication Using Double Bases . . . . . . . . . . . . . . 130--144 Sanjit Chatterjee and Palash Sarkar HIBE With Short Public Parameters Without Random Oracle . . . . . . . . . 145--160 Nuttapong Attrapadung and Jun Furukawa and Hideki Imai Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys . . . . . . . . . . . . . . 161--177 David Galindo and Javier Herranz and Eike Kiltz On the Generic Construction of Identity-Based Signatures with Additional Properties . . . . . . . . . 178--193 Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang On the Provable Security of an Efficient RSA-Based Pseudorandom Generator . . . . 194--209 Alexandra Boldyreva and Marc Fischlin On the Security of OAEP . . . . . . . . 210--225 Isamu Teranishi and Wakaha Ogata Relationship Between Standard Model Plaintext Awareness and Message Hiding 226--240 Gregor Leander and Andy Rupp On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms . . . 241--251 Pascal Paillier and Jorge L. Villar Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption . . . . . . . 252--266 Ellen Jochemsz and Alexander May A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants 267--282 Donghoon Chang and Sangjin Lee and Mridul Nandi and Moti Yung Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding . . . . . . . . . . . . . . . . 283--298 Mihir Bellare and Thomas Ristenpart Multi-Property-Preserving Hash Domain Extension and the EMD Transform . . . . 299--314