Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings [1 ed.]
9783642103650, 3642103650
This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cry
Table of contents : Front Matter....Pages - Related-Key Cryptanalysis of the Full AES-192 and AES-256....Pages 1-18 The Key-Dependent Attack on Block Ciphers....Pages 19-36 Cascade Encryption Revisited....Pages 37-51 Quantum-Secure Coin-Flipping and Applications....Pages 52-69 On the Power of Two-Party Quantum Cryptography....Pages 70-87 Security Bounds for the Design of Code-Based Cryptosystems....Pages 88-105 Rebound Attack on the Full Lane Compression Function....Pages 106-125 Rebound Distinguishers: Results on the Full Whirlpool Compression Function....Pages 126-143 MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners....Pages 144-161 The Intel AES Instructions Set and the SHA-3 Candidates....Pages 162-178 Group Encryption: Non-interactive Realization in the Standard Model....Pages 179-196 On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations....Pages 197-213 Hierarchical Predicate Encryption for Inner-Products....Pages 214-231 Hedged Public-Key Encryption: How to Protect against Bad Randomness....Pages 232-249 Secure Two-Party Computation Is Practical....Pages 250-267 Secure Multi-party Computation Minimizing Online Rounds....Pages 268-286 Improved Non-committing Encryption with Applications to Adaptively Secure Protocols....Pages 287-302 Non-malleable Statistically Hiding Commitment from Any One-Way Function....Pages 303-318 Proofs of Storage from Homomorphic Identification Protocols....Pages 319-333 Simple Adaptive Oblivious Transfer without Random Oracle....Pages 334-346 Improved Generic Algorithms for 3-Collisions....Pages 347-363 A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical....Pages 364-381 How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!....Pages 382-398 On the Analysis of Cryptographic Assumptions in the Generic Ring Model....Pages 399-416 Zero Knowledge in the Random Oracle Model, Revisited....Pages 417-434 A Framework for Universally Composable Non-committing Blind Signatures....Pages 435-450 Cryptanalysis of the Square Cryptosystems....Pages 451-468 Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses....Pages 469-486 Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?....Pages 487-504 Security Notions and Generic Constructions for Client Puzzles....Pages 505-523 Foundations of Non-malleable Hash and One-Way Functions....Pages 524-541 Improved Cryptanalysis of Skein....Pages 542-559 Linearization Framework for Collision Attacks: Application to CubeHash and MD6....Pages 560-577 Preimages for Step-Reduced SHA-2....Pages 578-597 Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures....Pages 598-616 Efficient Public Key Encryption Based on Ideal Lattices....Pages 617-635 Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices....Pages 636-652 PSS Is Secure against Random Fault Attacks....Pages 653-666 Cache-Timing Template Attacks....Pages 667-684 Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions....Pages 685-702 Signature Schemes with Bounded Leakage Resilience....Pages 703-720 Back Matter....Pages -