Advances in Cryptology – ASIACRYPT 2014

20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I

  • Palash Sarkar
  • Tetsu Iwata
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8873)

Table of contents

  1. Front Matter
  2. Cryptology and Coding Theory

    1. Qian Guo, Thomas Johansson, Carl Löndahl
      Pages 1-20
    2. Jean-Charles Faugère, Ludovic Perret, Frédéric de Portzamparc
      Pages 21-41
  3. New Proposals

  4. Authenticated Encryption

    1. Philipp Jovanovic, Atul Luykx, Bart Mennink
      Pages 85-104
    2. Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
      Pages 105-125
  5. Symmetric Key Cryptanalysis

    1. Sareh Emami, San Ling, Ivica Nikolić, Josef Pieprzyk, Huaxiong Wang
      Pages 141-157
    2. Henri Gilbert
      Pages 200-222
  6. Side Channel Analysis I

    1. Jake Longo, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijin Stam, Michael J. Tunstall
      Pages 223-242
    2. Luke Mather, Elisabeth Oswald, Carolyn Whitnall
      Pages 243-261
    3. Diego F. Aranha, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Mehdi Tibouchi, Jean-Christophe Zapalowicz
      Pages 262-281
    4. Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
      Pages 282-296
  7. Hyperelliptic Curve Cryptography

    1. Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe
      Pages 317-337
    2. Huseyin Hisil, Craig Costello
      Pages 338-357
  8. Factoring and Discrete Log

    1. Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra
      Pages 358-377

Other volumes

  1. Advances in Cryptology – ASIACRYPT 2014
    20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I
  2. 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Keywords

cryptanalysis and other attacks cryptography hardware attacks and countermeasures information theory information-theoretic techniques key management mathematical foundations of cryptography mathematics of computing public key (asymmetric) techniques public key encryption security in hardware security services software and application security symmetric cryptography and hash functions

Editors and affiliations

  • Palash Sarkar
    • 1
  • Tetsu Iwata
    • 2
  1. 1.Applied Statistics UnitIndian Statistical InstituteKolkataIndia
  2. 2.Nagoya UniversityJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-45611-8
  • Copyright Information International Association for Cryptologic Research 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-45610-1
  • Online ISBN 978-3-662-45611-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book