Last update:
Wed Apr 5 15:15:25 MDT 2023
François-Xavier Standaert and
Gilles Piret and
Neil Gershenfeld and
Jean-Jacques Quisquater SEA: A Scalable Encryption Algorithm for
Small Embedded Applications . . . . . . 222--236
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Front Matter . . . . . . . . . . . . . . ??
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Front Matter . . . . . . . . . . . . . . 1--1
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Chapter 1: On the Perron Root of
Irreducible Matrices . . . . . . . . . . 3--49
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Chapter 2: On the Positive Solution to a
Linear System with Nonnegative
Coefficients . . . . . . . . . . . . . . 51--68
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Front Matter . . . . . . . . . . . . . . 69--69
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Chapter 3: Introduction . . . . . . . . 71--73
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Chapter 4: Network Model . . . . . . . . 75--89
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Chapter 5: Resource Allocation Problem
in Communications Networks . . . . . . . 91--128
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Chapter 6: Power Control Algorithm . . . 129--152
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Front Matter . . . . . . . . . . . . . . 153--153
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Appendix A: Some Concepts and Results
from Matrix Analysis . . . . . . . . . . 155--170
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Appendix B: Some Concepts and Results
from Convex Analysis . . . . . . . . . . 171--183
S\lawomir Sta\'nczak and
Marcin Wiczanowski and
Holger Boche Back Matter . . . . . . . . . . . . . . ??
Christophe De Canni\`ere and
Christian Rechberger Finding SHA-1 Characteristics: General
Results and Applications . . . . . . . . 1--20
Yusuke Naito and
Yu Sasaki and
Takeshi Shimoyama and
Jun Yajima and
Noboru Kunihiro and
Kazuo Ohta Improved Collision Search for SHA-0 . . 21--36
Scott Contini and
Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks
on HMAC and NMAC Using Hash Collisions 37--53
Bin Zhang and
Dengguo Feng New Guess-and-Determine Attack on the
Self-Shrinking Generator . . . . . . . . 54--68
Souradyuti Paul and
Bart Preneel On the (In)security of Stream Ciphers
Based on Arrays and Modular Addition . . 69--83
Na Li and
Wen-Feng Qi Construction and Analysis of Boolean
Functions of $ 2 t + 1 $ Variables with
Maximum Algebraic Immunity . . . . . . . 84--98
Qiming Li and
Yagiz Sutcu and
Nasir Memon Secure Sketch for Biometric Templates 99--113
P. Gaudry and
T. Houtmann and
D. Kohel and
C. Ritzenthaler and
A. Weng The $2$-Adic CM Method for Genus $2$
Curves with Application to Cryptography 114--129
Roberto Avanzi and
Vassil Dimitrov and
Christophe Doche and
Francesco Sica Extending Scalar Multiplication Using
Double Bases . . . . . . . . . . . . . . 130--144
Sanjit Chatterjee and
Palash Sarkar HIBE With Short Public Parameters
Without Random Oracle . . . . . . . . . 145--160
Nuttapong Attrapadung and
Jun Furukawa and
Hideki Imai Forward-Secure and Searchable Broadcast
Encryption with Short Ciphertexts and
Private Keys . . . . . . . . . . . . . . 161--177
David Galindo and
Javier Herranz and
Eike Kiltz On the Generic Construction of
Identity-Based Signatures with
Additional Properties . . . . . . . . . 178--193
Ron Steinfeld and
Josef Pieprzyk and
Huaxiong Wang On the Provable Security of an Efficient
RSA-Based Pseudorandom Generator . . . . 194--209
Alexandra Boldyreva and
Marc Fischlin On the Security of OAEP . . . . . . . . 210--225
Isamu Teranishi and
Wakaha Ogata Relationship Between Standard Model
Plaintext Awareness and Message Hiding 226--240
Gregor Leander and
Andy Rupp On the Equivalence of RSA and Factoring
Regarding Generic Ring Algorithms . . . 241--251
Pascal Paillier and
Jorge L. Villar Trading One-Wayness Against
Chosen-Ciphertext Security in
Factoring-Based Encryption . . . . . . . 252--266
Ellen Jochemsz and
Alexander May A Strategy for Finding Roots of
Multivariate Polynomials with New
Applications in Attacking RSA Variants 267--282
Donghoon Chang and
Sangjin Lee and
Mridul Nandi and
Moti Yung Indifferentiable Security Analysis of
Popular Hash Functions with Prefix-Free
Padding . . . . . . . . . . . . . . . . 283--298
Mihir Bellare and
Thomas Ristenpart Multi-Property-Preserving Hash Domain
Extension and the EMD Transform . . . . 299--314