Advances in Cryptology – ASIACRYPT 2011

17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

Editors:

ISBN: 978-3-642-25384-3 (Print) 978-3-642-25385-0 (Online)

Table of contents (40 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Lattices and Quantum Cryptography

    1. No Access

      Book Chapter

      Pages 1-20

      BKZ 2.0: Better Lattice Security Estimates

    2. No Access

      Book Chapter

      Pages 21-40

      Functional Encryption for Inner Product Predicates from Learning with Errors

    3. No Access

      Book Chapter

      Pages 41-69

      Random Oracles in a Quantum World

  3. Public Key Encryption I

    1. No Access

      Book Chapter

      Pages 70-88

      Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security

    2. No Access

      Book Chapter

      Pages 89-106

      Structure Preserving CCA Secure Encryption and Applications

    3. No Access

      Book Chapter

      Pages 107-124

      Decoding Random Linear Codes in \(\tilde{\mathcal{O}}(2^{0.054n})\)

    4. No Access

      Book Chapter

      Pages 125-142

      Lower and Upper Bounds for Deniable Public-Key Encryption

  4. Public Key Encryption II

    1. No Access

      Book Chapter

      Pages 143-160

      Bridging Broadcast Encryption and Group Key Agreement

    2. No Access

      Book Chapter

      Pages 161-178

      On the Joint Security of Encryption and Signature, Revisited

    3. No Access

      Book Chapter

      Pages 179-196

      Polly Cracker, Revisited

  5. Database Privacy

    1. No Access

      Book Chapter

      Pages 197-214

      Oblivious RAM with O((logN)3) Worst-Case Cost

    2. No Access

      Book Chapter

      Pages 215-232

      Noiseless Database Privacy

  6. Hash Function

    1. No Access

      Book Chapter

      Pages 233-251

      The Preimage Security of Double-Block-Length Compression Functions

    2. No Access

      Book Chapter

      Pages 252-269

      Rebound Attack on JH42

    3. No Access

      Book Chapter

      Pages 270-287

      Second-Order Differential Collisions for Reduced SHA-256

    4. No Access

      Book Chapter

      Pages 288-307

      Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions

  7. Symmetric Key Encryption

    1. No Access

      Book Chapter

      Pages 308-326

      Cryptanalysis of ARMADILLO2

    2. No Access

      Book Chapter

      Pages 327-343

      An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware

    3. No Access

      Book Chapter

      Pages 344-371

      Biclique Cryptanalysis of the Full AES

    4. No Access

      Book Chapter

      Pages 372-389

      Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol

previous Page of 2