Advances in Cryptology – ASIACRYPT 2014

20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II

  • Palash Sarkar
  • Tetsu Iwata
Conference proceedings ASIACRYPT 2014
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8874)

Table of contents

  1. Front Matter
  2. Encryption Schemes

    1. Benoît Libert, Marc Joye, Moti Yung, Thomas Peters
      Pages 1-21
    2. Léo Ducas, Vadim Lyubashevsky, Thomas Prest
      Pages 22-41
    3. Isamu Teranishi, Moti Yung, Tal Malkin
      Pages 42-61
  3. Outsourcing and Delegation

    1. Kai-Min Chung, Zhenming Liu, Rafael Pass
      Pages 62-81
    2. Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao
      Pages 82-101
  4. Obfuscation

    1. Christina Brzuska, Arno Mittelbach
      Pages 122-141
  5. Homomorphic Cryptography

    1. Dario Catalano, Antonio Marcedone, Orazio Puglisi
      Pages 193-212
    2. Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen
      Pages 213-232
  6. Secret Sharing

    1. Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk
      Pages 233-253
    2. Ilan Komargodski, Moni Naor, Eylon Yogev
      Pages 254-273
  7. Block Ciphers and Passwords

    1. Jérémy Jean, Ivica Nikolić, Thomas Peyrin
      Pages 274-288
    2. Christian Forler, Stefan Lucks, Jakob Wenzel
      Pages 289-305
  8. Side Channel Analysis II

    1. Sonia Belaïd, Pierre-Alain Fouque, Benoît Gérard
      Pages 306-325
    2. Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
      Pages 326-343
    3. Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul
      Pages 344-365

Other volumes

  1. 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I
  2. Advances in Cryptology – ASIACRYPT 2014
    20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Keywords

cryptanalysis and other attacks cryptography hardware attacks and countermeasures information theory information-theoretic techniques key management mathematical foundations of cryptography mathematics of computing public key (asymmetric) techniques public key encryption security in hardware security services software and application security symmetric cryptography and hash functions

Editors and affiliations

  • Palash Sarkar
    • 1
  • Tetsu Iwata
    • 2
  1. 1.Applied Statistics UnitIndian Statistical InstituteKolkata,India
  2. 2.Nagoya UniversityJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-45608-8
  • Copyright Information International Association for Cryptologic Research 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-45607-1
  • Online ISBN 978-3-662-45608-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book