Skip to main content
Book cover

Advances in Cryptology – ASIACRYPT 2015

21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II

  • Conference proceedings
  • © 2015

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9453)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ASIACRYPT 2015.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (32 papers)

  1. Attacks on ASASA

  2. Number Field Sieve

  3. Hashes and MACs

  4. Foundations

  5. Side-Channel Attacks

Other volumes

  1. Advances in Cryptology -- ASIACRYPT 2015

  2. Advances in Cryptology – ASIACRYPT 2015

Keywords

About this book

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.

The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.

Editors and Affiliations

  • Nagoya, Japan

    Tetsu Iwata

  • Seoul National University, Seoul, Korea (Republic of)

    Jung Hee Cheon

Bibliographic Information

Publish with us