© 2008

Advances in Cryptology - ASIACRYPT 2008

14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

  • Josef Pieprzyk
Conference proceedings ASIACRYPT 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5350)

Table of contents

  1. Front Matter
  2. Multi-Party Computation

    1. Martin Hirt, Ueli Maurer, Vassilis Zikas
      Pages 1-18
    2. Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang
      Pages 19-36
    3. Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tartary
      Pages 37-53
  3. Invited Talk

    1. Andrew Chi-Chih Yao
      Pages 54-54
  4. Cryptographic Protocols I

    1. P. Morrissey, N. P. Smart, B. Warinschi
      Pages 55-73
    2. Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
      Pages 74-89
    3. Hovav Shacham, Brent Waters
      Pages 90-107
    4. Khaled Ouafi, Raphael Overbeck, Serge Vaudenay
      Pages 108-124
  5. Cryptographic Hash Functions I

    1. Mihir Bellare, Todor Ristov
      Pages 125-142
    2. Michael Gorski, Stefan Lucks, Thomas Peyrin
      Pages 143-160
  6. Cryptographic Protocols II

    1. Matthew Green, Susan Hohenberger
      Pages 179-197
    2. Manoj Prabhakaran, Mike Rosulek
      Pages 216-233
    3. Jan Camenisch, Rafik Chaabouni, abhi shelat
      Pages 234-252
  7. Cryptographic Hash Functions II

    1. Yu Sasaki, Kazumaro Aoki
      Pages 253-271
    2. Michael Backes, Dominique Unruh
      Pages 290-307
  8. Public-Key Cryptography I

About these proceedings


This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008.

The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.


anonymity block ciphers concurrent security cryptanalysis cryptographic attacks cryptographic protocols cryptography cryptology data security digital signature schemes electronic voting generic algorithms graph colorin hash function information security

Editors and affiliations

  • Josef Pieprzyk
    • 1
  1. 1.Department of ComputingMacquarie UniversitySydneyAustralia

Bibliographic information