Advances in Cryptology – ASIACRYPT 2011

17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

  • Dong Hoon Lee
  • Xiaoyun Wang
Conference proceedings ASIACRYPT 2011

DOI: 10.1007/978-3-642-25385-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7073)

Table of contents

  1. Front Matter
  2. Lattices and Quantum Cryptography

    1. Yuanmi Chen, Phong Q. Nguyen
      Pages 1-20
    2. Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
      Pages 21-40
    3. Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
      Pages 41-69
  3. Public Key Encryption I

    1. Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud
      Pages 70-88
    2. Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens
      Pages 89-106
    3. Alexander May, Alexander Meurer, Enrico Thomae
      Pages 107-124
    4. Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
      Pages 125-142
  4. Public Key Encryption II

    1. Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farràs
      Pages 143-160
    2. Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson
      Pages 161-178
    3. Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret
      Pages 179-196
  5. Database Privacy

    1. Elaine Shi, T. -H. Hubert Chan, Emil Stefanov, Mingfei Li
      Pages 197-214
    2. Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta
      Pages 215-232
  6. Hash Function

    1. Frederik Armknecht, Ewan Fleischmann, Matthias Krause, Jooyoung Lee, Martijn Stam, John Steinberger
      Pages 233-251
    2. María Naya-Plasencia, Deniz Toz, Kerem Varici
      Pages 252-269
    3. Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolić
      Pages 270-287
    4. Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 288-307
  7. Symmetric Key Encryption

    1. Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner
      Pages 308-326
    2. Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
      Pages 327-343
    3. Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
      Pages 344-371

About these proceedings

Introduction

This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011.
The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.

Keywords

cryptanalysis cryptography hash functions reliable communication verifiable secret sharing

Editors and affiliations

  • Dong Hoon Lee
    • 1
  • Xiaoyun Wang
    • 2
  1. 1.Center for Information Security TechnologiesKorea UniversitySeoulSouth Korea
  2. 2.Shandong UniversityChina

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-25384-3
  • Online ISBN 978-3-642-25385-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349