Advances in Cryptology – ASIACRYPT 2015

21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II

  • Tetsu Iwata
  • Jung Hee Cheon
Conference proceedings ASIACRYPT 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9453)

Also part of the Security and Cryptology book sub series (LNSC, volume 9453)

Table of contents

  1. Front Matter
    Pages I-XXV
  2. Attacks on ASASA

    1. Front Matter
      Pages 1-1
    2. Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
      Pages 3-27
  3. Number Field Sieve

    1. Front Matter
      Pages 29-29
    2. Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung
      Pages 31-55
  4. Hashes and MACs

    1. Front Matter
      Pages 57-57
    2. Bart Mennink, Bart Preneel
      Pages 59-84
    3. Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
      Pages 85-109
  5. Symmetric Encryption

  6. Foundations

    1. Front Matter
      Pages 181-181
    2. Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
      Pages 183-209
    3. Vladimir Kolesnikov, Alex J. Malozemoff
      Pages 210-235
    4. Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
      Pages 262-288
  7. Side-Channel Attacks

    1. Front Matter
      Pages 289-289
    2. Vincent Grosso, François-Xavier Standaert
      Pages 291-312
    3. Daniel P. Martin, Jonathan F. O’Connell, Elisabeth Oswald, Martijn Stam
      Pages 313-337

About these proceedings


The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.

The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.


authenticated encryption cryptanalysis hash functions reverse engineering security in hardware attribute-based encryption block cipher code-based cryptography collisions cryptocurrency cryptography encryption schemes malware oblivious transfer privacy provable security public key encryption security side-channel attacks zero-knowledge protocols

Editors and affiliations

  • Tetsu Iwata
    • 1
  • Jung Hee Cheon
    • 2
  1. 1.NagoyaJapan
  2. 2.Seoul National UniversitySeoulKorea (Republic of)

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-48799-0
  • Online ISBN 978-3-662-48800-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book