Advertisement

Advances in Cryptology – ASIACRYPT 2017

23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I

  • Tsuyoshi Takagi
  • Thomas Peyrin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10624)

Also part of the Security and Cryptology book sub series (LNSC, volume 10624)

Table of contents

  1. Front Matter
    Pages I-XXVI
  2. Asiacrypt 2017 Best Paper

    1. Front Matter
      Pages 1-1
    2. Steven D. Galbraith, Christophe Petit, Javier Silva
      Pages 3-33
  3. Post-Quantum Cryptography

    1. Front Matter
      Pages 35-35
    2. Dominique Unruh
      Pages 65-95
  4. Symmetric Key Cryptanalysis

    1. Front Matter
      Pages 97-97
    2. Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang
      Pages 99-127
    3. Fukang Liu, Florian Mendel, Gaoli Wang
      Pages 158-186
    4. Andrey Bogdanov, Philip S. Vejre
      Pages 187-216
    5. Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth
      Pages 217-243
    6. Takanori Isobe, Kyoji Shibutani
      Pages 244-263
  5. Lattices

    1. Front Matter
      Pages 265-265
    2. Martin R. Albrecht, Amit Deo
      Pages 267-296
    3. Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
      Pages 297-322
    4. Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski
      Pages 323-346
  6. Homomorphic Encryptions

    1. Front Matter
      Pages 375-375
    2. Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
      Pages 377-408
    3. Jung Hee Cheon, Andrey Kim, Miran Kim, Yongsoo Song
      Pages 409-437
    4. Gorjan Alagic, Yfke Dulek, Christian Schaffner, Florian Speelman
      Pages 438-467
  7. Access Control

    1. Front Matter
      Pages 469-469
    2. Christian Badertscher, Christian Matt, Ueli Maurer
      Pages 502-532
    3. Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
      Pages 533-563
  8. Oblivious Protocols

    1. Front Matter
      Pages 565-565
    2. T.-H. Hubert Chan, Kai-Min Chung, Elaine Shi
      Pages 567-597
    3. Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
      Pages 598-628
    4. Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges
      Pages 629-659
    5. T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
      Pages 660-690
  9. Side Channel Analysis

    1. Front Matter
      Pages 691-691
    2. Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam
      Pages 693-723
    3. Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
      Pages 724-754
    4. Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
      Pages 755-780
    5. Sebastian Faust, Clara Paglialonga, Tobias Schneider
      Pages 781-810
  10. Back Matter
    Pages 811-813

Other volumes

  1. Advances in Cryptology – ASIACRYPT 2017
    23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I
  2. 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II
  3. 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III

About these proceedings

Introduction

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.
The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Keywords

Data security Cryptography Authentication Public key cryptography Encryption Software engineering Security systems Access control Cryptanalysis Elliptic curve Privacy Artificial intelligence Knowledge based system Case based reasoning Data privacy

Editors and affiliations

  • Tsuyoshi Takagi
    • 1
  • Thomas Peyrin
    • 2
  1. 1.The University of TokyoTokyoJapan
  2. 2.Nanyang Technological UniversitySingaporeSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-70694-8
  • Copyright Information International Association for Cryptologic Research 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-70693-1
  • Online ISBN 978-3-319-70694-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site