Book Volume 5912 2009

Advances in Cryptology – ASIACRYPT 2009

15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings


ISBN: 978-3-642-10365-0 (Print) 978-3-642-10366-7 (Online)

Table of contents (41 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Block Ciphers

    1. Chapter

      Pages 1-18

      Related-Key Cryptanalysis of the Full AES-192 and AES-256

    2. Chapter

      Pages 19-36

      The Key-Dependent Attack on Block Ciphers

    3. Chapter

      Pages 37-51

      Cascade Encryption Revisited

  3. Quantum and Post-Quantum

    1. Chapter

      Pages 52-69

      Quantum-Secure Coin-Flipping and Applications

    2. Chapter

      Pages 70-87

      On the Power of Two-Party Quantum Cryptography

    3. Chapter

      Pages 88-105

      Security Bounds for the Design of Code-Based Cryptosystems

  4. Hash Functions I

    1. Chapter

      Pages 106-125

      Rebound Attack on the Full Lane Compression Function

    2. Chapter

      Pages 126-143

      Rebound Distinguishers: Results on the Full Whirlpool Compression Function

    3. Chapter

      Pages 144-161

      MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners

    4. Chapter

      Pages 162-178

      The Intel AES Instructions Set and the SHA-3 Candidates

  5. Encryption Schemes

    1. Chapter

      Pages 179-196

      Group Encryption: Non-interactive Realization in the Standard Model

    2. Chapter

      Pages 197-213

      On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations

    3. Chapter

      Pages 214-231

      Hierarchical Predicate Encryption for Inner-Products

    4. Chapter

      Pages 232-249

      Hedged Public-Key Encryption: How to Protect against Bad Randomness

  6. Multi Party Computation

    1. Chapter

      Pages 250-267

      Secure Two-Party Computation Is Practical

    2. Chapter

      Pages 268-286

      Secure Multi-party Computation Minimizing Online Rounds

    3. Chapter

      Pages 287-302

      Improved Non-committing Encryption with Applications to Adaptively Secure Protocols

  7. Cryptographic Protocols

    1. Chapter

      Pages 303-318

      Non-malleable Statistically Hiding Commitment from Any One-Way Function

    2. Chapter

      Pages 319-333

      Proofs of Storage from Homomorphic Identification Protocols

    3. Chapter

      Pages 334-346

      Simple Adaptive Oblivious Transfer without Random Oracle

previous Page of 3