Advances in Cryptology - ASIACRYPT 2008

14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

  • Josef Pieprzyk
Conference proceedings ASIACRYPT 2008

DOI: 10.1007/978-3-540-89255-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5350)

Table of contents (34 papers)

  1. Front Matter
  2. Multi-Party Computation

    1. MPC vs. SFE : Unconditional and Computational Security
      Martin Hirt, Ueli Maurer, Vassilis Zikas
      Pages 1-18
    2. Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
      Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang
      Pages 19-36
    3. Graph Design for Secure Multiparty Computation over Non-Abelian Groups
      Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tartary
      Pages 37-53
  3. Invited Talk

  4. Cryptographic Protocols I

    1. A Modular Security Analysis of the TLS Handshake Protocol
      P. Morrissey, N. P. Smart, B. Warinschi
      Pages 55-73
    2. Ambiguous Optimistic Fair Exchange
      Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
      Pages 74-89
    3. Compact Proofs of Retrievability
      Hovav Shacham, Brent Waters
      Pages 90-107
    4. On the Security of HB# against a Man-in-the-Middle Attack
      Khaled Ouafi, Raphael Overbeck, Serge Vaudenay
      Pages 108-124
  5. Cryptographic Hash Functions I

    1. Hash Functions from Sigma Protocols and Improvements to VSH
      Mihir Bellare, Todor Ristov
      Pages 125-142
    2. Slide Attacks on a Class of Hash Functions
      Michael Gorski, Stefan Lucks, Thomas Peyrin
      Pages 143-160
  6. Cryptographic Protocols II

    1. Universally Composable Adaptive Oblivious Transfer
      Matthew Green, Susan Hohenberger
      Pages 179-197
    2. Towards Robust Computation on Encrypted Data
      Manoj Prabhakaran, Mike Rosulek
      Pages 216-233
    3. Efficient Protocols for Set Membership and Range Proofs
      Jan Camenisch, Rafik Chaabouni, abhi shelat
      Pages 234-252
  7. Cryptographic Hash Functions II

    1. Preimage Attacks on 3, 4, and 5-Pass HAVAL
      Yu Sasaki, Kazumaro Aoki
      Pages 253-271
    2. Limits of Constructive Security Proofs
      Michael Backes, Dominique Unruh
      Pages 290-307
  8. Public-Key Cryptography I

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008.

The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.

Keywords

anonymity block ciphers concurrent security cryptanalysis cryptographic attacks cryptographic protocols cryptography cryptology data security digital signature schemes electronic voting generic algorithms graph colorin hash function information security

Editors and affiliations

  • Josef Pieprzyk
    • 1
  1. 1.Department of ComputingMacquarie UniversitySydneyAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-89254-0
  • Online ISBN 978-3-540-89255-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349