Advertisement

Advances in Cryptology – ASIACRYPT 2019

25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III

  • Steven D. Galbraith
  • Shiho Moriai
Conference proceedings ASIACRYPT 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11923)

Also part of the Security and Cryptology book sub series (LNSC, volume 11923)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Signatures

    1. Front Matter
      Pages 1-1
    2. Yilei Chen, Nicholas Genise, Pratyay Mukherjee
      Pages 3-32
    3. Daniel J. Bernstein, Andreas Hülsing
      Pages 33-62
    4. Mojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian
      Pages 63-93
  3. Public Key Encryption (1)

    1. Front Matter
      Pages 95-95
    2. Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
      Pages 97-127
    3. Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka
      Pages 128-158
    4. Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols
      Pages 159-190
    5. Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch
      Pages 191-221
  4. Side Channels

    1. Front Matter
      Pages 223-223
    2. Christoph Dobraunig, Bart Mennink
      Pages 225-255
    3. Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos et al.
      Pages 285-314
    4. Stefan Dziembowski, Sebastian Faust, Karol Żebrowski
      Pages 315-344
  5. Symmetric Cryptography (2)

    1. Front Matter
      Pages 345-345
    2. Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger et al.
      Pages 371-397
    3. Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
      Pages 398-427
  6. Functional Encryption

    1. Front Matter
      Pages 457-457
    2. James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma et al.
      Pages 489-519
    3. Michel Abdalla, Fabrice Benhamouda, Romain Gay
      Pages 552-582
  7. Public Key Encryption (2)

    1. Front Matter
      Pages 583-583
    2. Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta
      Pages 585-606
    3. Mihir Bellare, Wei Dai, Lucy Li
      Pages 607-636
    4. Shohei Egashira, Yuyu Wang, Keisuke Tanaka
      Pages 637-666
  8. Zero Knowledge

    1. Front Matter
      Pages 667-667
    2. Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang
      Pages 669-699
    3. Sharon Goldberg, Leonid Reyzin, Omar Sagga, Foteini Baldimtsi
      Pages 700-727
    4. Alonso González, Carla Ràfols
      Pages 728-757
  9. Back Matter
    Pages 759-761

Other volumes

  1. 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I
  2. 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
  3. Advances in Cryptology – ASIACRYPT 2019
    25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III

About these proceedings

Introduction

The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019.

The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.

Keywords

authentication block ciphers ciphertexts computer crime computer science cryptography data mining data privacy data security electronic document identification systems encryption fuzzy control fuzzy sets network security privacy project management public key cryptography secret key software engineering structural design

Editors and affiliations

  1. 1.University of AucklandAucklandNew Zealand
  2. 2.Security Fundamentals LabNICTTokyoJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-34618-8
  • Copyright Information International Association for Cryptologic Research 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-34617-1
  • Online ISBN 978-3-030-34618-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site