Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

This book constitutes the refereed proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2010, held in Singapore, in December 2010.
The 35 revised full papers presented were carefully reviewed and selected from 216 submissions. The papers are organized in topical sections on hash attacks; symmetric-key cryptosystems; block and stream ciphers; prools; key exchange; foundation; zero-knowledge; lattice-based cryptography; secure communication and computation; models, notions, and assumptions; and public-key encryption.

1027745717
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

This book constitutes the refereed proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2010, held in Singapore, in December 2010.
The 35 revised full papers presented were carefully reviewed and selected from 216 submissions. The papers are organized in topical sections on hash attacks; symmetric-key cryptosystems; block and stream ciphers; prools; key exchange; foundation; zero-knowledge; lattice-based cryptography; secure communication and computation; models, notions, and assumptions; and public-key encryption.

54.99 In Stock
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

Paperback(2010)

$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This book constitutes the refereed proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2010, held in Singapore, in December 2010.
The 35 revised full papers presented were carefully reviewed and selected from 216 submissions. The papers are organized in topical sections on hash attacks; symmetric-key cryptosystems; block and stream ciphers; prools; key exchange; foundation; zero-knowledge; lattice-based cryptography; secure communication and computation; models, notions, and assumptions; and public-key encryption.


Product Details

ISBN-13: 9783642173721
Publisher: Springer Berlin Heidelberg
Publication date: 01/14/2011
Series: Lecture Notes in Computer Science , #6477
Edition description: 2010
Pages: 634
Product dimensions: 0.00(w) x 0.00(h) x 0.04(d)

Table of Contents

Hash Attacks

Rotational Rebound Attacks on Reduced Skein Dmitry Khovratovich Ivica Nikolic Christian Rechberger 1

Finding Second Preimages of Short Messages for Hamsi-256 Thomas Fuhr 20

Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl Yu Sasaki Yang Li Lei Wang Kazuo Sakiyama Kazuo Ohta 38

Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 Jian Guo San Ling Christian Rechberger Huaxiong Wang 56

Collision Attacks against the Knudsen-Preneel Compression Functions Onur Özen Martijn Stam 76

Symmetric-Key Cryptosystems

Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions Emmanuel Volte Valérie Nachef Jacques Patarin 94

The World Is Not Enough: Another Look on Second-Order DPA François-Xavier Standaert Nicolas Veyrat-Charvillon Elisabeth Oswald Benedikt Gierlichs Marcel Medwed Markus Kasper Stefan Mangard 112

Block and Stream Ciphers

Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems Simon Knellwolf Willi Meier María Naya-Plasencia 130

A Byte-Based Guess and Determine Attack on SOSEMANUK Xiutao Feng Jun Liu Zhaocun Zhou Chuankun Wu Dengguo Feng 146

Improved Single-Key Attacks on 8-Round AES-192 and AES-256 Orr Dunkelman Nathan Keller Adi Shamir 158

Protocols

Constant-Size Commitments to Polynomials and Their Applications Aniket Kate Gregory M. Zaverucha Ian Goldberg 177

Computationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay Tomas Toft 195

Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model Emiliano De Cristofaro Jihye Kim Gene Tsudik 213

Key Exchange

Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schäge Jörg Schwenk 232

A Forward-Secure Symmetric-Key Derivation Protocol: How to Improve Classical DUKPT Eric Brier Thomas Peyrin 250

Foundation

Efficient String-Commitment from Weak Bit-Commitment Kai-Min Chung Feng-Hao Liu Chi-Jen Lu Bo-Yin Yang 268

On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields Robert Granger 283

Random Oracles with(out) Programmability Marc Fischlin Anja Lehmann Thomas Ristenpart Thomas Shrimpton Martijn Stam Stefano Tessaro 303

Zero-Knowledge

Short Pairing-Based Non-interactive Zero-Knowledge Arguments Jens Groth 321

Short Non-interactive Zero-Knowledge Proofs Jens Groth 341

Optimistic Concurrent Zero-Knowledge Alon Rosen abhi shelat 359

Lattice-Based Cryptography

Faster Fully Homomorphic Encryption Damien Stehlé Ron Steinfeld 377

A Group Signature Scheme from Lattice Assumptions S. Dov Gordon Jonathan Katz Vinod Vaikuntanathan 395

Lattice-Based Blind Signatures Markus Rückert 413

Secure Communication and Computation

The Round Complexity of Verifiable Secret Sharing: The Statistical Case Ranjit Kumaresan Arpita Patra C. Pandu Rangan 431

General Perfectly Secure Message Transmission Using Linear Codes Qiushi Yang Yvo Desmedt 448

On Invertible Sampling and Adaptive Security Yuval Ishai Abishek Kumarasubramanian Claudio Orlandi Amit Sahai 466

Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition Chao Ning Qiuliang Xu 483

Models, Notions, and Assumptions

A Closer Look at Anonymity and Robustness in Encryption Schemes Payman Mohassel 501

Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures Sarah Meiklejohn Hovav Shacham David Mandell Freeman 519

The Semi-Generic Group Model and Applications to Pairing-Based Cryptography Tibor Jager Andy Rupp 539

Public-Key Encryption

The Degree of Regularity of HFE Systems Vivien Dubois Nicolas Gama 557

Structured Encryption and Controlled Disclosure Melissa Chase Seny Kamara 577

Leakage Resilient ElGamal Encryption Eike Kiltz Krzysztof Pietrzak 595

Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis Kristiyan Haralambiev Adriana López-Alt Daniel Wichs 613

Author Index 633

From the B&N Reads Blog

Customer Reviews