Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

Bibliographic Details
Other Authors: Abe, Masayuki (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
  • Key Exchange
  • Generic Compilers for Authenticated Key Exchange
  • A Forward-Secure Symmetric-Key Derivation Protocol
  • Foundation
  • Efficient String-Commitment from Weak Bit-Commitment
  • On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
  • Random Oracles with(out) Programmability
  • Zero-Knowledge
  • Short Pairing-Based Non-interactive Zero-Knowledge Arguments
  • Short Non-interactive Zero-Knowledge Proofs
  • Optimistic Concurrent Zero Knowledge
  • Lattice-Based Cryptography
  • Faster Fully Homomorphic Encryption
  • A Group Signature Scheme from Lattice Assumptions
  • Lattice-Based Blind Signatures
  • Secure Communication and Computation
  • The Round Complexity of Verifiable Secret Sharing: The Statistical Case
  • General Perfectly Secure Message Transmission UsingLinear Codes
  • On Invertible Sampling and Adaptive Security
  • Hash Attacks
  • Rotational Rebound Attacks on Reduced Skein
  • Finding Second Preimages of Short Messages for Hamsi-256
  • Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
  • Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
  • Collision Attacks against the Knudsen-Preneel Compression Functions
  • Symmetric-Key Cryptosystems
  • Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
  • The World Is Not Enough: Another Look on Second-Order DPA
  • Block and Stream Ciphers
  • Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
  • A Byte-Based Guess and Determine Attack on SOSEMANUK
  • Improved Single-Key Attacks on 8-Round AES-192 and AES-256
  • Protocols
  • Constant-Size Commitments to Polynomials and Their Applications
  • Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
  • Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition
  • Models, Notions, and Assumptions
  • A Closer Look at Anonymity and Robustness in Encryption Schemes
  • Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
  • The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
  • Public-Key Encryption
  • The Degree of Regularity of HFE Systems
  • Structured Encryption and Controlled Disclosure
  • Leakage Resilient ElGamal Encryption
  • Efficient Public-Key Cryptography in the Presence of Key Leakage