Book Volume 7658 2012

Advances in Cryptology – ASIACRYPT 2012

18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings


ISBN: 978-3-642-34960-7 (Print) 978-3-642-34961-4 (Online)

Table of contents (46 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Invited Talks

    1. Chapter

      Pages 1-1

      Pairing-Based Cryptography: Past, Present, and Future

    2. Chapter

      Pages 2-3

      Some Mathematical Mysteries in Lattices

  3. Public-Key Cryptography I

    1. Chapter

      Pages 4-24

      Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions

    2. Chapter

      Pages 25-42

      Dual Form Signatures: An Approach for Proving Security from Static Assumptions

    3. Chapter

      Pages 43-60

      Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)

    4. Chapter

      Pages 61-79

      On the (Im)possibility of Projecting Property in Prime-Order Setting

  4. Foundation

    1. Chapter

      Pages 80-97

      Optimal Reductions of Some Decisional Problems to the Rank Problem

    2. Chapter

      Pages 98-115

      Signature Schemes Secure against Hard-to-Invert Leakage

    3. Chapter

      Pages 116-133

      Completeness for Symmetric Two-Party Functionalities - Revisited

    4. Chapter

      Pages 134-153

      Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing

    5. Chapter

      Pages 154-171

      The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions

  5. Symmetric Cipher

    1. Chapter

      Pages 172-189

      Perfect Algebraic Immune Functions

    2. Chapter

      Pages 190-207

      Differential Analysis of the LED Block Cipher

    3. Chapter

      Pages 208-225

      PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications

    4. Chapter

      Pages 226-243

      Analysis of Differential Attacks in ARX Constructions

    5. Chapter

      Pages 244-261

      Integral and Multidimensional Linear Distinguishers with Correlation Zero

    6. Chapter

      Pages 262-277

      Differential Attacks against Stream Cipher ZUC

  6. Security Proof

    1. Chapter

      Pages 278-295

      An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher

    2. Chapter

      Pages 296-312

      3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound

    3. Chapter

      Pages 313-330

      Understanding Adaptivity: Random Systems Revisited

previous Page of 3