Advertisement

Advances in Cryptology - ASIACRYPT 2010

16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

  • Masayuki Abe

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6477)

Table of contents

  1. Front Matter
  2. Hash Attacks

    1. Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger
      Pages 1-19
    2. Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta
      Pages 38-55
  3. Symmetric-Key Cryptosystems

    1. Emmanuel Volte, Valérie Nachef, Jacques Patarin
      Pages 94-111
    2. François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper et al.
      Pages 112-129
  4. Block and Stream Ciphers

    1. Simon Knellwolf, Willi Meier, María Naya-Plasencia
      Pages 130-145
    2. Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, Dengguo Feng
      Pages 146-157
    3. Orr Dunkelman, Nathan Keller, Adi Shamir
      Pages 158-176
  5. Protocols

    1. Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
      Pages 177-194
    2. Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
      Pages 213-231
  6. Key Exchange

    1. Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
      Pages 232-249
    2. Eric Brier, Thomas Peyrin
      Pages 250-267
  7. Foundation

    1. Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang
      Pages 268-282
    2. Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro
      Pages 303-320
  8. Zero-Knowledge

  9. Lattice-Based Cryptography

    1. Damien Stehlé, Ron Steinfeld
      Pages 377-394
    2. S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan
      Pages 395-412
    3. Markus Rückert
      Pages 413-430
  10. Secure Communication and Computation

    1. Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan
      Pages 431-447
    2. Yuval Ishai, Abishek Kumarasubramanian, Claudio Orlandi, Amit Sahai
      Pages 466-482
  11. Models, Notions, and Assumptions

  12. Public-Key Encryption

    1. Vivien Dubois, Nicolas Gama
      Pages 557-576
    2. Melissa Chase, Seny Kamara
      Pages 577-594
    3. Eike Kiltz, Krzysztof Pietrzak
      Pages 595-612
    4. Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs
      Pages 613-631
  13. Back Matter

About these proceedings

Keywords

DES Skein Tiger Zero Knowledge algebraic cryptanalysis block ciphers complexity cryptanalysis cryptographic assumptions cryptography differential cryptanalysis encryption schemes information security linear codes rotational cryptanalysis

Editors and affiliations

  • Masayuki Abe
    • 1
  1. 1. TokyoJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-17373-8
  • Copyright Information International Association for Cryptologic Research 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17372-1
  • Online ISBN 978-3-642-17373-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site