International Conference on the Theory and Application of Cryptology and Information Security

Advances in Cryptology -- ASIACRYPT 2015

21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9452)

Table of contents

  1. Front Matter
    Pages I-XXV
  2. Best Paper

    1. Front Matter
      Pages 1-1
    2. Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld
      Pages 3-24
  3. Indistinguishability Obfuscation

    1. Front Matter
      Pages 25-25
    2. Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai
      Pages 27-51
    3. Dakshita Khurana, Vanishree Rao, Amit Sahai
      Pages 52-75
  4. PRFs and Hashes

    1. Front Matter
      Pages 77-77
    2. Susan Hohenberger, Venkata Koppula, Brent Waters
      Pages 79-102
    3. Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
      Pages 103-120
    4. Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs
      Pages 121-145
  5. Discrete Logarithms and Number Theory

  6. Signatures

    1. Front Matter
      Pages 237-237
    2. Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang
      Pages 260-285
    3. Sanjit Chatterjee, Alfred Menezes
      Pages 286-310
    4. Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, Jintai Ding
      Pages 311-334

About these proceedings

Introduction

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.

The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.

Keywords

authenticated encryption cryptanalysis hash functions reverse engineering security in hardware attribute-based encryption block cipher code-based cryptography collisions cryptocurrency cryptography encryption schemes malware oblivious transfer privacy provable security public key encryption security side-channel attacks zero-knowledge protocols

Editors and affiliations

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-48797-6
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-48796-9
  • Online ISBN 978-3-662-48797-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book