ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2 6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was...
ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2 6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the Int...
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity, alsocalledunconditionalsecurity, where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are...
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Informat...
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010. The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption.
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010. The 17 papers presented we...