Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings [1 ed.] 9783642103650, 3642103650

This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cry

256 77 7MB

English Pages 722 [733] Year 2009

Report DMCA / Copyright

DOWNLOAD DJVU FILE

Table of contents :
Front Matter....Pages -
Related-Key Cryptanalysis of the Full AES-192 and AES-256....Pages 1-18
The Key-Dependent Attack on Block Ciphers....Pages 19-36
Cascade Encryption Revisited....Pages 37-51
Quantum-Secure Coin-Flipping and Applications....Pages 52-69
On the Power of Two-Party Quantum Cryptography....Pages 70-87
Security Bounds for the Design of Code-Based Cryptosystems....Pages 88-105
Rebound Attack on the Full Lane Compression Function....Pages 106-125
Rebound Distinguishers: Results on the Full Whirlpool Compression Function....Pages 126-143
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners....Pages 144-161
The Intel AES Instructions Set and the SHA-3 Candidates....Pages 162-178
Group Encryption: Non-interactive Realization in the Standard Model....Pages 179-196
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations....Pages 197-213
Hierarchical Predicate Encryption for Inner-Products....Pages 214-231
Hedged Public-Key Encryption: How to Protect against Bad Randomness....Pages 232-249
Secure Two-Party Computation Is Practical....Pages 250-267
Secure Multi-party Computation Minimizing Online Rounds....Pages 268-286
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols....Pages 287-302
Non-malleable Statistically Hiding Commitment from Any One-Way Function....Pages 303-318
Proofs of Storage from Homomorphic Identification Protocols....Pages 319-333
Simple Adaptive Oblivious Transfer without Random Oracle....Pages 334-346
Improved Generic Algorithms for 3-Collisions....Pages 347-363
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical....Pages 364-381
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!....Pages 382-398
On the Analysis of Cryptographic Assumptions in the Generic Ring Model....Pages 399-416
Zero Knowledge in the Random Oracle Model, Revisited....Pages 417-434
A Framework for Universally Composable Non-committing Blind Signatures....Pages 435-450
Cryptanalysis of the Square Cryptosystems....Pages 451-468
Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses....Pages 469-486
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?....Pages 487-504
Security Notions and Generic Constructions for Client Puzzles....Pages 505-523
Foundations of Non-malleable Hash and One-Way Functions....Pages 524-541
Improved Cryptanalysis of Skein....Pages 542-559
Linearization Framework for Collision Attacks: Application to CubeHash and MD6....Pages 560-577
Preimages for Step-Reduced SHA-2....Pages 578-597
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures....Pages 598-616
Efficient Public Key Encryption Based on Ideal Lattices....Pages 617-635
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices....Pages 636-652
PSS Is Secure against Random Fault Attacks....Pages 653-666
Cache-Timing Template Attacks....Pages 667-684
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions....Pages 685-702
Signature Schemes with Bounded Leakage Resilience....Pages 703-720
Back Matter....Pages -

Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings [1 ed.]
 9783642103650, 3642103650

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
Recommend Papers