ASIACRYPT 2006: Shanghai, China

Attacks on Hash Functions

Stream Ciphers and Boolean Functions

Biometrics and ECC Computation

ID-Based Schemes

Public-Key Schemes

RSA and Factorization

Construction of Hash Function

Protocols

Block Ciphers

Signatures