Advances in Cryptology – ASIACRYPT 2012

18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

  • Xiaoyun Wang
  • Kazue Sako
Conference proceedings ASIACRYPT 2012

DOI: 10.1007/978-3-642-34961-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7658)

Table of contents (46 papers)

  1. Front Matter
  2. Invited Talks

  3. Public-Key Cryptography I

    1. Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
      Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
      Pages 4-24
    2. Dual Form Signatures: An Approach for Proving Security from Static Assumptions
      Michael Gerbush, Allison Lewko, Adam O’Neill, Brent Waters
      Pages 25-42
    3. Breaking Pairing-Based Cryptosystems Using ηT Pairing over GF(397)
      Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
      Pages 43-60
  4. Foundation

    1. Signature Schemes Secure against Hard-to-Invert Leakage
      Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
      Pages 98-115
    2. Completeness for Symmetric Two-Party Functionalities - Revisited
      Yehuda Lindell, Eran Omri, Hila Zarosim
      Pages 116-133
    3. Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
      Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
      Pages 134-153
  5. Symmetric Cipher

    1. Perfect Algebraic Immune Functions
      Meicheng Liu, Yin Zhang, Dongdai Lin
      Pages 172-189
    2. Differential Analysis of the LED Block Cipher
      Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varıcı
      Pages 190-207
    3. PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
      Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen et al.
      Pages 208-225
    4. Integral and Multidimensional Linear Distinguishers with Correlation Zero
      Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang
      Pages 244-261
    5. Differential Attacks against Stream Cipher ZUC
      Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling
      Pages 262-277
  6. Security Proof

    1. An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
      Rodolphe Lampe, Jacques Patarin, Yannick Seurin
      Pages 278-295
    2. 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
      Liting Zhang, Wenling Wu, Han Sui, Peng Wang
      Pages 296-312

About these proceedings


This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012.

The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.


collision attack elliptic curve cryptography homomorphic signatures pairing-based cryptosystems secure computation secure computation

Editors and affiliations

  • Xiaoyun Wang
    • 1
  • Kazue Sako
    • 2
  1. 1.Tsinghua UniversityBeijingChina
  2. 2.Central Research LaboratoriesNECKawasakiJapan

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34960-7
  • Online ISBN 978-3-642-34961-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349