Advertisement

Advances in Cryptology – ASIACRYPT 2019

25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I

  • Steven D. Galbraith
  • Shiho Moriai
Conference proceedings ASIACRYPT 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11921)

Also part of the Security and Cryptology book sub series (LNSC, volume 11921)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Invited Talk

  3. Best Paper

    1. Front Matter
      Pages 19-19
    2. Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
      Pages 21-51
  4. Lattices (1)

    1. Front Matter
      Pages 53-53
    2. Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang
      Pages 55-81
    3. Qian Guo, Thomas Johansson, Jing Yang
      Pages 82-111
    4. Prabhanjan Ananth, Xiong Fan, Elaine Shi
      Pages 112-141
  5. Symmetric Cryptography

    1. Front Matter
      Pages 143-143
    2. Akinori Hosoyamada, Tetsu Iwata
      Pages 145-174
    3. Wonseok Choi, Byeonghak Lee, Jooyoung Lee
      Pages 175-195
    4. Xavier Bonnetain, Léo Perrin, Shizhu Tian
      Pages 196-223
  6. Isogenies (1)

    1. Front Matter
      Pages 225-225
    2. Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren
      Pages 227-247
    3. Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso
      Pages 248-277
    4. Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Song Tian
      Pages 278-308
  7. Obfuscation

    1. Front Matter
      Pages 309-309
    2. Dennis Hofheinz, Bogdan Ursu
      Pages 311-341
    3. Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters
      Pages 342-370
    4. Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
      Pages 371-398
  8. Multiparty Computation (1)

    1. Front Matter
      Pages 399-399
    2. Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu
      Pages 401-425
    3. Sanjam Garg, Aarushi Goel, Abhishek Jain
      Pages 426-455
    4. Alexander Koch, Michael Schrempp, Michael Kirsten
      Pages 488-517
  9. Quantum

    1. Front Matter
      Pages 519-519
    2. Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik
      Pages 521-551
    3. Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher
      Pages 552-583
    4. Minki Hhan, Keita Xagawa, Takashi Yamakawa
      Pages 584-614
    5. Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden
      Pages 615-645
  10. E-cash and Blockchain

    1. Front Matter
      Pages 647-647
    2. Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi
      Pages 649-678
    3. Florian Bourse, David Pointcheval, Olivier Sanders
      Pages 679-708
  11. Back Matter
    Pages 709-711

Other volumes

  1. Advances in Cryptology – ASIACRYPT 2019
    25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I
  2. 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
  3. 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III

About these proceedings

Introduction

The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019.

The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.

Keywords

authentication block ciphers ciphertexts computer crime computer science cryptography data mining data privacy data security electronic document identification systems encryption fuzzy control fuzzy sets network security privacy project management public key cryptography secret key software engineering structural design

Editors and affiliations

  1. 1.University of AucklandAucklandNew Zealand
  2. 2.Security Fundamentals LabNICTTokyoJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-34578-5
  • Copyright Information International Association for Cryptologic Research 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-34577-8
  • Online ISBN 978-3-030-34578-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site