Advances in Cryptology - ASIACRYPT 2010

16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

  • Masayuki Abe
Conference proceedings ASIACRYPT 2010

DOI: 10.1007/978-3-642-17373-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6477)

Table of contents (35 papers)

  1. Front Matter
  2. Hash Attacks

    1. Rotational Rebound Attacks on Reduced Skein
      Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger
      Pages 1-19
    2. Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
      Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta
      Pages 38-55
  3. Symmetric-Key Cryptosystems

    1. Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
      Emmanuel Volte, Valérie Nachef, Jacques Patarin
      Pages 94-111
    2. The World Is Not Enough: Another Look on Second-Order DPA
      François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper et al.
      Pages 112-129
  4. Block and Stream Ciphers

    1. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
      Simon Knellwolf, Willi Meier, María Naya-Plasencia
      Pages 130-145
    2. A Byte-Based Guess and Determine Attack on SOSEMANUK
      Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, Dengguo Feng
      Pages 146-157
    3. Improved Single-Key Attacks on 8-Round AES-192 and AES-256
      Orr Dunkelman, Nathan Keller, Adi Shamir
      Pages 158-176
  5. Protocols

    1. Constant-Size Commitments to Polynomials and Their Applications
      Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
      Pages 177-194
    2. Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
      Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
      Pages 213-231
  6. Key Exchange

    1. Generic Compilers for Authenticated Key Exchange
      Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
      Pages 232-249
    2. A Forward-Secure Symmetric-Key Derivation Protocol
      Eric Brier, Thomas Peyrin
      Pages 250-267
  7. Foundation

    1. Efficient String-Commitment from Weak Bit-Commitment
      Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang
      Pages 268-282
    2. Random Oracles with(out) Programmability
      Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro
      Pages 303-320
  8. Zero-Knowledge

About these proceedings


DES Skein Tiger Zero Knowledge algebraic cryptanalysis block ciphers complexity cryptanalysis cryptographic assumptions cryptography differential cryptanalysis encryption schemes information security linear codes rotational cryptanalysis

Editors and affiliations

  • Masayuki Abe
    • 1
  1. 1. TokyoJapan

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17372-1
  • Online ISBN 978-3-642-17373-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349