Table of contents for issues of Lecture Notes in Computer Science

Last update: Wed Apr 5 15:15:25 MDT 2023                Valid HTML 3.2!

Volume 3928, 2006
Volume 4000, 2006
Volume 4284, 2006


Lecture Notes in Computer Science
Volume 3928, 2006

François-Xavier Standaert and   
               Gilles Piret and   
           Neil Gershenfeld and   
        Jean-Jacques Quisquater   SEA: A Scalable Encryption Algorithm for
                                  Small Embedded Applications  . . . . . . 222--236


Lecture Notes in Computer Science
Volume 4000, 2006

       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Front Matter . . . . . . . . . . . . . . ??
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Front Matter . . . . . . . . . . . . . . 1--1
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Chapter 1: On the Perron Root of
                                  Irreducible Matrices . . . . . . . . . . 3--49
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Chapter 2: On the Positive Solution to a
                                  Linear System with Nonnegative
                                  Coefficients . . . . . . . . . . . . . . 51--68
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Front Matter . . . . . . . . . . . . . . 69--69
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Chapter 3: Introduction  . . . . . . . . 71--73
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Chapter 4: Network Model . . . . . . . . 75--89
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Chapter 5: Resource Allocation Problem
                                  in Communications Networks . . . . . . . 91--128
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Chapter 6: Power Control Algorithm . . . 129--152
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Front Matter . . . . . . . . . . . . . . 153--153
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Appendix A: Some Concepts and Results
                                  from Matrix Analysis . . . . . . . . . . 155--170
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Appendix B: Some Concepts and Results
                                  from Convex Analysis . . . . . . . . . . 171--183
       S\lawomir Sta\'nczak and   
         Marcin Wiczanowski and   
                   Holger Boche   Back Matter  . . . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 4284, 2006

   Christophe De Canni\`ere and   
           Christian Rechberger   Finding SHA-1 Characteristics: General
                                  Results and Applications . . . . . . . . 1--20
               Yusuke Naito and   
                  Yu Sasaki and   
          Takeshi Shimoyama and   
                 Jun Yajima and   
            Noboru Kunihiro and   
                     Kazuo Ohta   Improved Collision Search for SHA-0  . . 21--36
              Scott Contini and   
                 Yiqun Lisa Yin   Forgery and Partial Key-Recovery Attacks
                                  on HMAC and NMAC Using Hash Collisions   37--53
                  Bin Zhang and   
                   Dengguo Feng   New Guess-and-Determine Attack on the
                                  Self-Shrinking Generator . . . . . . . . 54--68
            Souradyuti Paul and   
                   Bart Preneel   On the (In)security of Stream Ciphers
                                  Based on Arrays and Modular Addition . . 69--83
                      Na Li and   
                    Wen-Feng Qi   Construction and Analysis of Boolean
                                  Functions of $ 2 t + 1 $ Variables with
                                  Maximum Algebraic Immunity . . . . . . . 84--98
                  Qiming Li and   
                Yagiz Sutcu and   
                    Nasir Memon   Secure Sketch for Biometric Templates    99--113
                  P. Gaudry and   
                T. Houtmann and   
                   D. Kohel and   
            C. Ritzenthaler and   
                        A. Weng   The $2$-Adic CM Method for Genus $2$
                                  Curves with Application to Cryptography  114--129
             Roberto Avanzi and   
            Vassil Dimitrov and   
           Christophe Doche and   
                 Francesco Sica   Extending Scalar Multiplication Using
                                  Double Bases . . . . . . . . . . . . . . 130--144
          Sanjit Chatterjee and   
                  Palash Sarkar   HIBE With Short Public Parameters
                                  Without Random Oracle  . . . . . . . . . 145--160
      Nuttapong Attrapadung and   
               Jun Furukawa and   
                    Hideki Imai   Forward-Secure and Searchable Broadcast
                                  Encryption with Short Ciphertexts and
                                  Private Keys . . . . . . . . . . . . . . 161--177
              David Galindo and   
             Javier Herranz and   
                     Eike Kiltz   On the Generic Construction of
                                  Identity-Based Signatures with
                                  Additional Properties  . . . . . . . . . 178--193
              Ron Steinfeld and   
             Josef Pieprzyk and   
                  Huaxiong Wang   On the Provable Security of an Efficient
                                  RSA-Based Pseudorandom Generator . . . . 194--209
        Alexandra Boldyreva and   
                  Marc Fischlin   On the Security of OAEP  . . . . . . . . 210--225
            Isamu Teranishi and   
                   Wakaha Ogata   Relationship Between Standard Model
                                  Plaintext Awareness and Message Hiding   226--240
             Gregor Leander and   
                      Andy Rupp   On the Equivalence of RSA and Factoring
                                  Regarding Generic Ring Algorithms  . . . 241--251
            Pascal Paillier and   
                Jorge L. Villar   Trading One-Wayness Against
                                  Chosen-Ciphertext Security in
                                  Factoring-Based Encryption . . . . . . . 252--266
             Ellen Jochemsz and   
                  Alexander May   A Strategy for Finding Roots of
                                  Multivariate Polynomials with New
                                  Applications in Attacking RSA Variants   267--282
             Donghoon Chang and   
                Sangjin Lee and   
               Mridul Nandi and   
                      Moti Yung   Indifferentiable Security Analysis of
                                  Popular Hash Functions with Prefix-Free
                                  Padding  . . . . . . . . . . . . . . . . 283--298
              Mihir Bellare and   
              Thomas Ristenpart   Multi-Property-Preserving Hash Domain
                                  Extension and the EMD Transform  . . . . 299--314