Advertisement

Advances in Cryptology -- ASIACRYPT 2015

21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I

  • Tetsu Iwata
  • Jung Hee Cheon
Conference proceedings ASIACRYPT 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9452)

Also part of the Security and Cryptology book sub series (LNSC, volume 9452)

Table of contents

  1. Front Matter
    Pages I-XXV
  2. Best Paper

    1. Front Matter
      Pages 1-1
    2. Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld
      Pages 3-24
  3. Indistinguishability Obfuscation

    1. Front Matter
      Pages 25-25
    2. Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai
      Pages 27-51
    3. Dakshita Khurana, Vanishree Rao, Amit Sahai
      Pages 52-75
  4. PRFs and Hashes

    1. Front Matter
      Pages 77-77
    2. Susan Hohenberger, Venkata Koppula, Brent Waters
      Pages 79-102
    3. Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
      Pages 103-120
    4. Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs
      Pages 121-145
  5. Discrete Logarithms and Number Theory

  6. Signatures

    1. Front Matter
      Pages 237-237
    2. Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang
      Pages 260-285
    3. Sanjit Chatterjee, Alfred Menezes
      Pages 286-310
    4. Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, Jintai Ding
      Pages 311-334
  7. Multiparty Computation I

    1. Front Matter
      Pages 335-335
    2. Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin
      Pages 337-359
    3. Sky Faber, Stanislaw Jarecki, Sotirios Kentros, Boyang Wei
      Pages 360-385
    4. Vladimir Kolesnikov, Ranjit Kumaresan
      Pages 386-412
  8. Public Key Encryption

    1. Front Matter
      Pages 413-413
    2. Carmit Hazay, Arpita Patra, Bogdan Warinschi
      Pages 443-469
    3. Allison Bishop, Abhishek Jain, Lucas Kowalczyk
      Pages 470-491
  9. ABE and IBE

    1. Front Matter
      Pages 493-493
    2. Dennis Hofheinz, Christian Matt, Ueli Maurer
      Pages 495-520
    3. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
      Pages 521-549
    4. Sergey Gorbunov, Dhinakaran Vinayagamurthy
      Pages 550-574
  10. Zero-Knowledge

    1. Front Matter
      Pages 603-603
    2. Alonso González, Alejandro Hevia, Carla Ràfols
      Pages 605-629
    3. Vinod Vaikuntanathan, Prashant Nalini Vasudevan
      Pages 656-680
    4. Benoît Libert, Thomas Peters, Marc Joye, Moti Yung
      Pages 681-707
  11. Multiparty Computation II

    1. Front Matter
      Pages 709-709
    2. Tore Kasper Frederiksen, Marcel Keller, Emmanuela Orsini, Peter Scholl
      Pages 711-735
    3. Abhi Shelat, Muthuramakrishnan Venkitasubramaniam
      Pages 736-757
    4. Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki
      Pages 758-782
    5. Alexander Koch, Stefan Walzer, Kevin Härtel
      Pages 783-807
  12. Back Matter
    Pages 809-810

Other volumes

  1. Advances in Cryptology -- ASIACRYPT 2015
    21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I
  2. 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.

The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.

Keywords

authenticated encryption cryptanalysis hash functions reverse engineering security in hardware attribute-based encryption block cipher code-based cryptography collisions cryptocurrency cryptography encryption schemes malware oblivious transfer privacy provable security public key encryption security side-channel attacks zero-knowledge protocols

Editors and affiliations

  • Tetsu Iwata
    • 1
  • Jung Hee Cheon
    • 2
  1. 1.NagoyaJapan
  2. 2.Seoul National UniversitySeoulKorea (Republic of)

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-48797-6
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-48796-9
  • Online ISBN 978-3-662-48797-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site