Advertisement

Advances in Cryptology – ASIACRYPT 2019

25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II

  • Steven D. Galbraith
  • Shiho Moriai
Conference proceedings ASIACRYPT 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11922)

Also part of the Security and Cryptology book sub series (LNSC, volume 11922)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Codes

    1. Front Matter
      Pages 1-1
    2. Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li
      Pages 3-24
    3. Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng
      Pages 25-55
  3. Lattices (2)

    1. Front Matter
      Pages 57-57
    2. Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet
      Pages 59-90
    3. Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma
      Pages 91-120
  4. Authenticated Encryption

    1. Front Matter
      Pages 151-151
    2. Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, Damian Vizár
      Pages 153-182
    3. John Chan, Phillip Rogaway
      Pages 183-208
    4. Jean Paul Degabriele, Christian Janson, Patrick Struck
      Pages 209-240
  5. Isogenies (2)

    1. Front Matter
      Pages 241-241
    2. Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
      Pages 273-292
  6. Multilinear Maps

    1. Front Matter
      Pages 323-323
    2. Jean-Sébastien Coron, Hilder V. L. Pereira
      Pages 325-355
    3. Jean-Sébastien Coron, Luca Notarnicola
      Pages 356-385
    4. Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
      Pages 386-412
  7. Homomorphic Encryption

    1. Front Matter
      Pages 413-413
    2. Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun Hee Lee, Keewoo Lee
      Pages 415-445
    3. Hao Chen, Ilaria Chillotti, Yongsoo Song
      Pages 446-472
    4. Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio
      Pages 473-502
  8. Combinatorial Cryptography

    1. Front Matter
      Pages 503-503
    2. Qi Chen, Chunming Tang, Zhiqiang Lin
      Pages 505-536
    3. Michael Raskin, Mark Simkin
      Pages 537-563
    4. Kaoru Kurosawa
      Pages 564-574
  9. Multiparty Computation (2)

    1. Front Matter
      Pages 575-575
    2. Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti
      Pages 577-605
    3. Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli
      Pages 606-635
    4. Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang
      Pages 636-666
  10. Back Matter
    Pages 667-669

Other volumes

  1. 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I
  2. Advances in Cryptology – ASIACRYPT 2019
    25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
  3. 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III

About these proceedings

Introduction

The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019.

The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.

Keywords

authentication block ciphers ciphertexts computer crime computer science cryptography data mining data privacy data security electronic document identification systems encryption fuzzy control fuzzy sets network security privacy project management public key cryptography secret key software engineering structural design

Editors and affiliations

  1. 1.University of AucklandAucklandNew Zealand
  2. 2.Security Fundamentals LabNICTTokyoJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-34621-8
  • Copyright Information International Association for Cryptologic Research 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-34620-1
  • Online ISBN 978-3-030-34621-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site