Overview
- Editors:
- Mitsuru Matsui
Information Technology R&D Center, Mitsubishi Electric Corporation, Kamakura, Kanagawa, Japan
Search author on:PubMed Google Scholar
Part of the book series:Lecture Notes in Computer Science (LNCS, volume 5912)
Part of the book sub series:Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ASIACRYPT 2009.
174kAccesses
12Citations
This is a preview of subscription content,log in via an institution to check access.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
Table of contents (41 papers)
Front Matter
Block Ciphers
Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Alex Biryukov, Dmitry Khovratovich
Pages 1-18
Quantum and Post-Quantum
On the Power of Two-Party Quantum Cryptography
- Louis Salvail, Christian Schaffner, Miroslava Sotáková
Pages 70-87Security Bounds for the Design of Code-Based Cryptosystems
- Matthieu Finiasz, Nicolas Sendrier
Pages 88-105
Hash Functions I
Rebound Attack on the FullLane Compression Function
- Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolić, Yu Sasaki, Martin Schläffer
Pages 106-125Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
Pages 126-143MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
- Florian Mendel, Christian Rechberger, Martin Schläffer
Pages 144-161The Intel AES Instructions Set and the SHA-3 Candidates
- Ryad Benadjila, Olivier Billet, Shay Gueron, Matt J. B. Robshaw
Pages 162-178
Encryption Schemes
Group Encryption: Non-interactive Realization in the Standard Model
- Julien Cathalo, Benoît Libert, Moti Yung
Pages 179-196On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
- Jonathan Katz, Arkady Yerukhimovich
Pages 197-213Hierarchical Predicate Encryption for Inner-Products
- Tatsuaki Okamoto, Katsuyuki Takashima
Pages 214-231Hedged Public-Key Encryption: How to Protect against Bad Randomness
- Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham et al.
Pages 232-249
Multi Party Computation
Secure Two-Party Computation Is Practical
- Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams
Pages 250-267Secure Multi-party Computation Minimizing Online Rounds
- Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung
Pages 268-286Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
- Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
Pages 287-302
Cryptographic Protocols
Non-malleable Statistically Hiding Commitment from Any One-Way Function
- Zongyang Zhang, Zhenfu Cao, Ning Ding, Rong Ma
Pages 303-318Proofs of Storage from Homomorphic Identification Protocols
- Giuseppe Ateniese, Seny Kamara, Jonathan Katz
Pages 319-333
Other volumes
Advances in Cryptology - ASIACRYPT 2009
Editors and Affiliations
Information Technology R&D Center, Mitsubishi Electric Corporation, Kamakura, Kanagawa, Japan
Mitsuru Matsui
Accessibility Information
Bibliographic Information
Book Title:Advances in Cryptology - ASIACRYPT 2009
Book Subtitle:15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings
Editors:Mitsuru Matsui
Series Title:Lecture Notes in Computer Science
DOI:https://doi.org/10.1007/978-3-642-10366-7
Publisher:Springer Berlin, Heidelberg
eBook Packages:Computer Science,Computer Science (R0)
Copyright Information:Springer-Verlag Berlin Heidelberg 2009
Softcover ISBN:978-3-642-10365-0Published: 17 November 2009
eBook ISBN:978-3-642-10366-7Published: 01 December 2009
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number:1
Number of Pages:XIV, 722
Topics:Cryptology,Programming Techniques,Discrete Mathematics,Algorithm Analysis and Problem Complexity,Data Structures and Information Theory,Discrete Mathematics in Computer Science