Advances in Cryptology – ASIACRYPT 2012

18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

  • Xiaoyun Wang
  • Kazue Sako
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7658)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Public-Key Cryptography I

    1. Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
      Pages 4-24
    2. Michael Gerbush, Allison Lewko, Adam O’Neill, Brent Waters
      Pages 25-42
    3. Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
      Pages 43-60
  4. Foundation

    1. Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
      Pages 98-115
    2. Yehuda Lindell, Eran Omri, Hila Zarosim
      Pages 116-133
    3. Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
      Pages 134-153
  5. Symmetric Cipher

    1. Meicheng Liu, Yin Zhang, Dongdai Lin
      Pages 172-189
    2. Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varıcı
      Pages 190-207
    3. Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen et al.
      Pages 208-225
    4. Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang
      Pages 244-261
    5. Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling
      Pages 262-277
  6. Security Proof

    1. Rodolphe Lampe, Jacques Patarin, Yannick Seurin
      Pages 278-295
    2. Liting Zhang, Wenling Wu, Han Sui, Peng Wang
      Pages 296-312

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012.

The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Keywords

collision attack elliptic curve cryptography homomorphic signatures pairing-based cryptosystems secure computation secure computation

Editors and affiliations

  • Xiaoyun Wang
    • 1
  • Kazue Sako
    • 2
  1. 1.Tsinghua UniversityBeijingChina
  2. 2.Central Research LaboratoriesNECKawasakiJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-34961-4
  • Copyright Information International Association for Cryptologic Research 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34960-7
  • Online ISBN 978-3-642-34961-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book