Advances in Cryptology – ASIACRYPT 2009

15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings

  • Mitsuru Matsui
Conference proceedings ASIACRYPT 2009

DOI: 10.1007/978-3-642-10366-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5912)

Table of contents (41 papers)

  1. Front Matter
  2. Block Ciphers

    1. Related-Key Cryptanalysis of the Full AES-192 and AES-256
      Alex Biryukov, Dmitry Khovratovich
      Pages 1-18
    2. The Key-Dependent Attack on Block Ciphers
      Xiaorui Sun, Xuejia Lai
      Pages 19-36
    3. Cascade Encryption Revisited
      Peter Gaži, Ueli Maurer
      Pages 37-51
  3. Quantum and Post-Quantum

    1. Quantum-Secure Coin-Flipping and Applications
      Ivan Damgård, Carolin Lunemann
      Pages 52-69
    2. On the Power of Two-Party Quantum Cryptography
      Louis Salvail, Christian Schaffner, Miroslava Sotáková
      Pages 70-87
    3. Security Bounds for the Design of Code-Based Cryptosystems
      Matthieu Finiasz, Nicolas Sendrier
      Pages 88-105
  4. Hash Functions I

    1. Rebound Attack on the Full Lane Compression Function
      Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolić, Yu Sasaki, Martin Schläffer
      Pages 106-125
    2. Rebound Distinguishers: Results on the Full Whirlpool Compression Function
      Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
      Pages 126-143
    3. MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
      Florian Mendel, Christian Rechberger, Martin Schläffer
      Pages 144-161
    4. The Intel AES Instructions Set and the SHA-3 Candidates
      Ryad Benadjila, Olivier Billet, Shay Gueron, Matt J. B. Robshaw
      Pages 162-178
  5. Encryption Schemes

    1. Group Encryption: Non-interactive Realization in the Standard Model
      Julien Cathalo, Benoît Libert, Moti Yung
      Pages 179-196
    2. On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
      Jonathan Katz, Arkady Yerukhimovich
      Pages 197-213
    3. Hierarchical Predicate Encryption for Inner-Products
      Tatsuaki Okamoto, Katsuyuki Takashima
      Pages 214-231
    4. Hedged Public-Key Encryption: How to Protect against Bad Randomness
      Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham et al.
      Pages 232-249
  6. Multi Party Computation

    1. Secure Two-Party Computation Is Practical
      Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams
      Pages 250-267
    2. Secure Multi-party Computation Minimizing Online Rounds
      Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung
      Pages 268-286
    3. Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
      Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
      Pages 287-302
  7. Cryptographic Protocols

    1. Non-malleable Statistically Hiding Commitment from Any One-Way Function
      Zongyang Zhang, Zhenfu Cao, Ning Ding, Rong Ma
      Pages 303-318
    2. Proofs of Storage from Homomorphic Identification Protocols
      Giuseppe Ateniese, Seny Kamara, Jonathan Katz
      Pages 319-333

About these proceedings


This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009.

The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels.


MD6 PSS SHA-3 authentication cryptanalysis cryptology factoring factoring-based signatures hash function hashing information information security lattice-based signatures public key quantum encryption

Editors and affiliations

  • Mitsuru Matsui
    • 1
  1. 1.Information Technology R&D CenterMitsubishi Electric CorporationKamakura, KanagawaJapan

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-10365-0
  • Online ISBN 978-3-642-10366-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349