Advertisement

Advances in Cryptology – ASIACRYPT 2018

24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II

  • Thomas Peyrin
  • Steven Galbraith
Conference proceedings ASIACRYPT 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11273)

Also part of the Security and Cryptology book sub series (LNSC, volume 11273)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Symmetric-Key Cryptanalysis

    1. Front Matter
      Pages 1-1
    2. Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu
      Pages 3-34
    3. Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella et al.
      Pages 35-64
    4. Ling Song, Jian Guo, Danping Shi, San Ling
      Pages 65-95
    5. Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
      Pages 96-124
  3. Public Key and Identity-Based Encryption

    1. Front Matter
      Pages 125-125
    2. Fuyuki Kitagawa, Keisuke Tanaka
      Pages 127-157
    3. Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He
      Pages 158-189
    4. Dennis Hofheinz, Dingding Jia, Jiaxin Pan
      Pages 190-220
  4. Asiacrypt 2018 Award Paper I

    1. Front Matter
      Pages 251-251
    2. Shuichi Katsumata, Shota Yamada, Takashi Yamakawa
      Pages 253-282
  5. Side-Channels

    1. Front Matter
      Pages 283-283
    2. Pierre Karpman, Daniel S. Roche
      Pages 285-314
    3. Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas
      Pages 315-342
    4. Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain
      Pages 343-372
    5. Alex Biryukov, Aleksei Udovenko
      Pages 373-402
  6. Signatures

    1. Front Matter
      Pages 403-403
    2. Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
      Pages 405-434
    3. Dan Boneh, Manu Drijvers, Gregory Neven
      Pages 435-464
    4. Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow
      Pages 465-492
    5. Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka
      Pages 493-522
  7. Asiacrypt 2018 Award Paper II

    1. Front Matter
      Pages 523-523
  8. Leakage-Resilient Cryptography

    1. Front Matter
      Pages 545-545
    2. Dahmun Goudarzi, Antoine Joux, Matthieu Rivain
      Pages 547-574
    3. Yu Chen, Yuyu Wang, Hong-Sheng Zhou
      Pages 575-606
  9. Functional/Inner Product/Predicate Encryption

    1. Front Matter
      Pages 607-607
    2. Junichi Tomida, Katsuyuki Takashima
      Pages 609-639
    3. Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
      Pages 640-672
    4. Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
      Pages 703-732
    5. Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
      Pages 733-764
  10. Back Matter
    Pages 765-767

Other volumes

  1. 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I
  2. Advances in Cryptology – ASIACRYPT 2018
    24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II
  3. 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III

About these proceedings

Introduction

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.

The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Keywords

artificial intelligence authentication ciphertexts cryptanalysis cryptography digital signature electronic document identification systems encryption identity based encryption identity-based network security problem solving public key cryptography public-key encryption random oracle model side-channel software engineering

Editors and affiliations

  1. 1.Nanyang Technological UniversitySingaporeSingapore
  2. 2.University of AucklandAucklandNew Zealand

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-03329-3
  • Copyright Information International Association for Cryptologic Research 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-03328-6
  • Online ISBN 978-3-030-03329-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site