Advances in Cryptology - ASIACRYPT 2010

16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

Editors:

ISBN: 978-3-642-17372-1 (Print) 978-3-642-17373-8 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Hash Attacks

    1. Book Chapter

      Pages 1-19

      Rotational Rebound Attacks on Reduced Skein

    2. Book Chapter

      Pages 20-37

      Finding Second Preimages of Short Messages for Hamsi-256

    3. Book Chapter

      Pages 38-55

      Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl

    4. Book Chapter

      Pages 56-75

      Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2

    5. Book Chapter

      Pages 76-93

      Collision Attacks against the Knudsen-Preneel Compression Functions

  3. Symmetric-Key Cryptosystems

    1. Book Chapter

      Pages 94-111

      Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions

    2. Book Chapter

      Pages 112-129

      The World Is Not Enough: Another Look on Second-Order DPA

  4. Block and Stream Ciphers

    1. Book Chapter

      Pages 130-145

      Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems

    2. Book Chapter

      Pages 146-157

      A Byte-Based Guess and Determine Attack on SOSEMANUK

    3. Book Chapter

      Pages 158-176

      Improved Single-Key Attacks on 8-Round AES-192 and AES-256

  5. Protocols

    1. Book Chapter

      Pages 177-194

      Constant-Size Commitments to Polynomials and Their Applications

    2. Book Chapter

      Pages 195-212

      Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    3. Book Chapter

      Pages 213-231

      Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model

  6. Key Exchange

    1. Book Chapter

      Pages 232-249

      Generic Compilers for Authenticated Key Exchange

    2. Book Chapter

      Pages 250-267

      A Forward-Secure Symmetric-Key Derivation Protocol

  7. Foundation

    1. Book Chapter

      Pages 268-282

      Efficient String-Commitment from Weak Bit-Commitment

    2. Book Chapter

      Pages 283-302

      On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

    3. Book Chapter

      Pages 303-320

      Random Oracles with(out) Programmability

  8. Zero-Knowledge

    1. Book Chapter

      Pages 321-340

      Short Pairing-Based Non-interactive Zero-Knowledge Arguments

    2. Book Chapter

      Pages 341-358

      Short Non-interactive Zero-Knowledge Proofs

previous Page of 2