Advances in Cryptology - ASIACRYPT 2013

19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I

Editors:

ISBN: 978-3-642-42032-0 (Print) 978-3-642-42033-7 (Online)

Table of contents (27 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Zero-Knowledge

    1. No Access

      Book Chapter

      Pages 1-20

      Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces

    2. No Access

      Book Chapter

      Pages 21-40

      Constant-Round Concurrent Zero Knowledge in the Bounded Player Model

    3. No Access

      Book Chapter

      Pages 41-60

      Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes

  3. Algebraic Cryptography

    1. No Access

      Book Chapter

      Pages 61-78

      Families of Fast Elliptic Curves from ℚ-curves

    2. No Access

      Book Chapter

      Pages 79-96

      Four-Dimensional GLV via the Weil Restriction

    3. No Access

      Book Chapter

      Pages 97-116

      Discrete Gaussian Leftover Hash Lemma over Infinite Domains

    4. No Access

      Book Chapter

      Pages 117-133

      New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography

  4. Theoretical Cryptography-I

    1. No Access

      Book Chapter

      Pages 134-153

      Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited

    2. No Access

      Book Chapter

      Pages 154-173

      Reset Indifferentiability and Its Consequences

    3. No Access

      Book Chapter

      Pages 174-193

      Computational Fuzzy Extractors

    4. No Access

      Book Chapter

      Pages 194-213

      Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization

  5. Protocols

    1. No Access

      Book Chapter

      Pages 214-234

      SPHF-Friendly Non-interactive Commitments

    2. No Access

      Book Chapter

      Pages 235-254

      Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency

    3. No Access

      Book Chapter

      Pages 255-275

      Function-Private Subspace-Membership Encryption and Its Applications

    4. No Access

      Book Chapter

      Pages 276-295

      Random Projections, Graph Sparsification, and Differential Privacy

  6. Theoretical Cryptography-II

    1. No Access

      Book Chapter

      Pages 296-315

      Notions of Black-Box Reductions, Revisited

    2. No Access

      Book Chapter

      Pages 316-336

      Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments

  7. Symmetric Key Cryptanalysis

    1. No Access

      Book Chapter

      Pages 337-356

      Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES 2

    2. No Access

      Book Chapter

      Pages 357-376

      Key Difference Invariant Bias in Block Ciphers

    3. No Access

      Book Chapter

      Pages 377-404

      Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE

previous Page of 2