Skip to main content
  • Conference proceedings
  • © 2012

Advances in Cryptology -- ASIACRYPT 2012

18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012, Proceedings

  • Up-to-date results
  • Fast-track conference proceedings
  • State-of-the-art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7658)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (46 papers)

  1. Front Matter

  2. Invited Talks

    1. Some Mathematical Mysteries in Lattices

      • Chuanming Zong
      Pages 2-3
  3. Public-Key Cryptography I

    1. Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions

      • Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
      Pages 4-24
    2. Dual Form Signatures: An Approach for Proving Security from Static Assumptions

      • Michael Gerbush, Allison Lewko, Adam O’Neill, Brent Waters
      Pages 25-42
    3. Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)

      • Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
      Pages 43-60
  4. Foundation

    1. Signature Schemes Secure against Hard-to-Invert Leakage

      • Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
      Pages 98-115
    2. Completeness for Symmetric Two-Party Functionalities - Revisited

      • Yehuda Lindell, Eran Omri, Hila Zarosim
      Pages 116-133
    3. Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing

      • Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
      Pages 134-153
  5. Symmetric Cipher

    1. Perfect Algebraic Immune Functions

      • Meicheng Liu, Yin Zhang, Dongdai Lin
      Pages 172-189
    2. Differential Analysis of the LED Block Cipher

      • Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varıcı
      Pages 190-207
    3. PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications

      • Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen et al.
      Pages 208-225
    4. Integral and Multidimensional Linear Distinguishers with Correlation Zero

      • Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang
      Pages 244-261
    5. Differential Attacks against Stream Cipher ZUC

      • Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling
      Pages 262-277
  6. Security Proof

    1. An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher

      • Rodolphe Lampe, Jacques Patarin, Yannick Seurin
      Pages 278-295
    2. 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound

      • Liting Zhang, Wenling Wu, Han Sui, Peng Wang
      Pages 296-312

Other Volumes

  1. Advances in Cryptology – ASIACRYPT 2012

About this book

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Editors and Affiliations

  • Tsinghua University, Beijing, China

    Xiaoyun Wang

  • Central Research Laboratories, NEC, Kawasaki, Japan

    Kazue Sako

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access