Advertisement

Advances in Cryptology – ASIACRYPT 2015

21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II

  • Tetsu Iwata
  • Jung Hee Cheon
Conference proceedings ASIACRYPT 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9453)

Also part of the Security and Cryptology book sub series (LNSC, volume 9453)

Table of contents

  1. Front Matter
    Pages I-XXV
  2. Attacks on ASASA

    1. Front Matter
      Pages 1-1
    2. Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
      Pages 3-27
  3. Number Field Sieve

    1. Front Matter
      Pages 29-29
    2. Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung
      Pages 31-55
  4. Hashes and MACs

    1. Front Matter
      Pages 57-57
    2. Bart Mennink, Bart Preneel
      Pages 59-84
    3. Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
      Pages 85-109
  5. Symmetric Encryption

  6. Foundations

    1. Front Matter
      Pages 181-181
    2. Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
      Pages 183-209
    3. Vladimir Kolesnikov, Alex J. Malozemoff
      Pages 210-235
    4. Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
      Pages 262-288
  7. Side-Channel Attacks

    1. Front Matter
      Pages 289-289
    2. Vincent Grosso, François-Xavier Standaert
      Pages 291-312
    3. Daniel P. Martin, Jonathan F. O’Connell, Elisabeth Oswald, Martijn Stam
      Pages 313-337
    4. Andrey Bogdanov, Takanori Isobe
      Pages 361-385
  8. Design of Block Ciphers

    1. Front Matter
      Pages 387-387
    2. Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita et al.
      Pages 411-436
  9. Authenticated Encryption

    1. Front Matter
      Pages 463-463
    2. Bart Mennink, Reza Reyhanitabar, Damian Vizár
      Pages 465-489
    3. Christoph Dobraunig, Maria Eichlseder, Florian Mendel
      Pages 490-509
    4. Thomas Fuhr, Gaëtan Leurent, Valentin Suder
      Pages 510-532
  10. Symmetric Analysis

    1. Front Matter
      Pages 533-533
    2. Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
      Pages 535-560
    3. Bin Zhang, Xinxin Gong
      Pages 561-585
    4. Christoph Dobraunig, Maria Eichlseder, Florian Mendel
      Pages 612-630
  11. Cryptanalysis

    1. Front Matter
      Pages 631-631
    2. Alex Biryukov, Dmitry Khovratovich
      Pages 633-657
    3. Sanjit Chatterjee, M. Prem Laxman Das
      Pages 658-682
    4. Sonia Bogos, Serge Vaudenay
      Pages 704-731
  12. Privacy and Lattices

    1. Front Matter
      Pages 733-733
    2. Cynthia Dwork, Moni Naor, Omer Reingold, Guy N. Rothblum
      Pages 735-751
    3. Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois
      Pages 752-775
    4. Allison Bishop, Susan Hohenberger, Brent Waters
      Pages 776-800
  13. Back Matter
    Pages 801-802

Other volumes

  1. 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I
  2. Advances in Cryptology – ASIACRYPT 2015
    21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.

The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.

Keywords

authenticated encryption cryptanalysis hash functions reverse engineering security in hardware attribute-based encryption block cipher code-based cryptography collisions cryptocurrency cryptography encryption schemes malware oblivious transfer privacy provable security public key encryption security side-channel attacks zero-knowledge protocols

Editors and affiliations

  • Tetsu Iwata
    • 1
  • Jung Hee Cheon
    • 2
  1. 1.NagoyaJapan
  2. 2.Seoul National UniversitySeoulKorea (Republic of)

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-48800-3
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-48799-0
  • Online ISBN 978-3-662-48800-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site