Skip to main content
  • Conference proceedings
  • © 2008

Advances in Cryptology - ASIACRYPT 2008

14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5350)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2008.

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-89255-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 105.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (34 papers)

  1. Front Matter

  2. Multi-Party Computation

    1. MPC vs. SFE : Unconditional and Computational Security

      • Martin Hirt, Ueli Maurer, Vassilis Zikas
      Pages 1-18
    2. Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes

      • Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang
      Pages 19-36
    3. Graph Design for Secure Multiparty Computation over Non-Abelian Groups

      • Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tartary
      Pages 37-53
  3. Invited Talk

    1. Some Perspectives on Complexity-Based Cryptography

      • Andrew Chi-Chih Yao
      Pages 54-54
  4. Cryptographic Protocols I

    1. A Modular Security Analysis of the TLS Handshake Protocol

      • P. Morrissey, N. P. Smart, B. Warinschi
      Pages 55-73
    2. Ambiguous Optimistic Fair Exchange

      • Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
      Pages 74-89
    3. Compact Proofs of Retrievability

      • Hovav Shacham, Brent Waters
      Pages 90-107
    4. On the Security of HB# against a Man-in-the-Middle Attack

      • Khaled Ouafi, Raphael Overbeck, Serge Vaudenay
      Pages 108-124
  5. Cryptographic Hash Functions I

    1. Hash Functions from Sigma Protocols and Improvements to VSH

      • Mihir Bellare, Todor Ristov
      Pages 125-142
    2. Slide Attacks on a Class of Hash Functions

      • Michael Gorski, Stefan Lucks, Thomas Peyrin
      Pages 143-160
  6. Cryptographic Protocols II

    1. Universally Composable Adaptive Oblivious Transfer

      • Matthew Green, Susan Hohenberger
      Pages 179-197
    2. Towards Robust Computation on Encrypted Data

      • Manoj Prabhakaran, Mike Rosulek
      Pages 216-233
    3. Efficient Protocols for Set Membership and Range Proofs

      • Jan Camenisch, Rafik Chaabouni, abhi shelat
      Pages 234-252
  7. Cryptographic Hash Functions II

    1. Preimage Attacks on 3, 4, and 5-Pass HAVAL

      • Yu Sasaki, Kazumaro Aoki
      Pages 253-271
    2. Limits of Constructive Security Proofs

      • Michael Backes, Dominique Unruh
      Pages 290-307
  8. Public-Key Cryptography I

Other Volumes

  1. Advances in Cryptology - ASIACRYPT 2008

    14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

About this book

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008.

The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.

Keywords

  • anonymity
  • block ciphers
  • concurrent security
  • cryptanalysis
  • cryptographic attacks
  • cryptographic protocols
  • cryptography
  • cryptology
  • data security
  • digital signature schemes
  • electronic voting
  • generic algorithms
  • graph colorin
  • hash function
  • information security
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Computing, Macquarie University, Sydney, Australia

    Josef Pieprzyk

Bibliographic Information

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-89255-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 105.00
Price excludes VAT (USA)