Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Advances in Cryptology - ASIACRYPT 2009

15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings

  • Conference proceedings
  • © 2009

Accessibility Information

Overview

Editors:
  1. Mitsuru Matsui
    1. Information Technology R&D Center, Mitsubishi Electric Corporation, Kamakura, Kanagawa, Japan

Part of the book series:Lecture Notes in Computer Science (LNCS, volume 5912)

Part of the book sub series:Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ASIACRYPT 2009.

This is a preview of subscription content,log in via an institution to check access.

Access this book

Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Other ways to access

About this book

This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels.

Similar content being viewed by others

Keywords

Table of contents (41 papers)

  1. Block Ciphers

    1. Related-Key Cryptanalysis of the Full AES-192 and AES-256

      • Alex Biryukov, Dmitry Khovratovich
      Pages 1-18
    2. The Key-Dependent Attack on Block Ciphers

      • Xiaorui Sun, Xuejia Lai
      Pages 19-36
    3. Cascade Encryption Revisited

      • Peter Gaži, Ueli Maurer
      Pages 37-51
  2. Quantum and Post-Quantum

    1. Quantum-Secure Coin-Flipping and Applications

      • Ivan Damgård, Carolin Lunemann
      Pages 52-69
    2. On the Power of Two-Party Quantum Cryptography

      • Louis Salvail, Christian Schaffner, Miroslava Sotáková
      Pages 70-87
    3. Security Bounds for the Design of Code-Based Cryptosystems

      • Matthieu Finiasz, Nicolas Sendrier
      Pages 88-105
  3. Hash Functions I

    1. Rebound Attack on the FullLane Compression Function

      • Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolić, Yu Sasaki, Martin Schläffer
      Pages 106-125
    2. Rebound Distinguishers: Results on the Full Whirlpool Compression Function

      • Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
      Pages 126-143
    3. MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners

      • Florian Mendel, Christian Rechberger, Martin Schläffer
      Pages 144-161
    4. The Intel AES Instructions Set and the SHA-3 Candidates

      • Ryad Benadjila, Olivier Billet, Shay Gueron, Matt J. B. Robshaw
      Pages 162-178
  4. Encryption Schemes

    1. Group Encryption: Non-interactive Realization in the Standard Model

      • Julien Cathalo, Benoît Libert, Moti Yung
      Pages 179-196
    2. Hierarchical Predicate Encryption for Inner-Products

      • Tatsuaki Okamoto, Katsuyuki Takashima
      Pages 214-231
    3. Hedged Public-Key Encryption: How to Protect against Bad Randomness

      • Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham et al.
      Pages 232-249
  5. Multi Party Computation

    1. Secure Two-Party Computation Is Practical

      • Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams
      Pages 250-267
    2. Secure Multi-party Computation Minimizing Online Rounds

      • Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung
      Pages 268-286
    3. Improved Non-committing Encryption with Applications to Adaptively Secure Protocols

      • Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
      Pages 287-302
  6. Cryptographic Protocols

    1. Non-malleable Statistically Hiding Commitment from Any One-Way Function

      • Zongyang Zhang, Zhenfu Cao, Ning Ding, Rong Ma
      Pages 303-318
    2. Proofs of Storage from Homomorphic Identification Protocols

      • Giuseppe Ateniese, Seny Kamara, Jonathan Katz
      Pages 319-333

Other volumes

  1. Advances in Cryptology - ASIACRYPT 2009

Editors and Affiliations

  • Information Technology R&D Center, Mitsubishi Electric Corporation, Kamakura, Kanagawa, Japan

    Mitsuru Matsui

Accessibility Information

Accessibility information for this book is coming soon. We're working to make it available as quickly as possible. Thank you for your patience.

Bibliographic Information

Publish with us

Back to top

Access this book

Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Other ways to access


[8]ページ先頭

©2009-2025 Movatter.jp