Skip to main content
  • Conference proceedings
  • © 2009

Advances in Cryptology - ASIACRYPT 2009

15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5912)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (41 papers)

  1. Front Matter

  2. Block Ciphers

    1. Related-Key Cryptanalysis of the Full AES-192 and AES-256

      • Alex Biryukov, Dmitry Khovratovich
      Pages 1-18
    2. The Key-Dependent Attack on Block Ciphers

      • Xiaorui Sun, Xuejia Lai
      Pages 19-36
    3. Cascade Encryption Revisited

      • Peter Gaži, Ueli Maurer
      Pages 37-51
  3. Quantum and Post-Quantum

    1. Quantum-Secure Coin-Flipping and Applications

      • Ivan DamgÃ¥rd, Carolin Lunemann
      Pages 52-69
    2. On the Power of Two-Party Quantum Cryptography

      • Louis Salvail, Christian Schaffner, Miroslava Sotáková
      Pages 70-87
    3. Security Bounds for the Design of Code-Based Cryptosystems

      • Matthieu Finiasz, Nicolas Sendrier
      Pages 88-105
  4. Hash Functions I

    1. Rebound Attack on the Full Lane Compression Function

      • Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolić, Yu Sasaki, Martin Schläffer
      Pages 106-125
    2. Rebound Distinguishers: Results on the Full Whirlpool Compression Function

      • Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
      Pages 126-143
    3. MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners

      • Florian Mendel, Christian Rechberger, Martin Schläffer
      Pages 144-161
    4. The Intel AES Instructions Set and the SHA-3 Candidates

      • Ryad Benadjila, Olivier Billet, Shay Gueron, Matt J. B. Robshaw
      Pages 162-178
  5. Encryption Schemes

    1. Group Encryption: Non-interactive Realization in the Standard Model

      • Julien Cathalo, Benoît Libert, Moti Yung
      Pages 179-196
    2. On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations

      • Jonathan Katz, Arkady Yerukhimovich
      Pages 197-213
    3. Hierarchical Predicate Encryption for Inner-Products

      • Tatsuaki Okamoto, Katsuyuki Takashima
      Pages 214-231
    4. Hedged Public-Key Encryption: How to Protect against Bad Randomness

      • Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham et al.
      Pages 232-249
  6. Multi Party Computation

    1. Secure Two-Party Computation Is Practical

      • Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams
      Pages 250-267
    2. Secure Multi-party Computation Minimizing Online Rounds

      • Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung
      Pages 268-286
    3. Improved Non-committing Encryption with Applications to Adaptively Secure Protocols

      • Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
      Pages 287-302
  7. Cryptographic Protocols

    1. Non-malleable Statistically Hiding Commitment from Any One-Way Function

      • Zongyang Zhang, Zhenfu Cao, Ning Ding, Rong Ma
      Pages 303-318
    2. Proofs of Storage from Homomorphic Identification Protocols

      • Giuseppe Ateniese, Seny Kamara, Jonathan Katz
      Pages 319-333

Other Volumes

  1. Advances in Cryptology – ASIACRYPT 2009

About this book

This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels.

Editors and Affiliations

  • Information Technology R&D Center, Mitsubishi Electric Corporation, Kamakura, Kanagawa, Japan

    Mitsuru Matsui

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access