Advances in Cryptology - ASIACRYPT 2008

14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

  • Josef Pieprzyk
Conference proceedings ASIACRYPT 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5350)

Table of contents

  1. Front Matter
  2. Multi-Party Computation

    1. Martin Hirt, Ueli Maurer, Vassilis Zikas
      Pages 1-18
    2. Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang
      Pages 19-36
    3. Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tartary
      Pages 37-53
  3. Invited Talk

  4. Cryptographic Protocols I

    1. P. Morrissey, N. P. Smart, B. Warinschi
      Pages 55-73
    2. Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
      Pages 74-89
    3. Hovav Shacham, Brent Waters
      Pages 90-107
    4. Khaled Ouafi, Raphael Overbeck, Serge Vaudenay
      Pages 108-124
  5. Cryptographic Hash Functions I

    1. Mihir Bellare, Todor Ristov
      Pages 125-142
    2. Michael Gorski, Stefan Lucks, Thomas Peyrin
      Pages 143-160
  6. Cryptographic Protocols II

    1. Matthew Green, Susan Hohenberger
      Pages 179-197
    2. Manoj Prabhakaran, Mike Rosulek
      Pages 216-233
    3. Jan Camenisch, Rafik Chaabouni, abhi shelat
      Pages 234-252
  7. Cryptographic Hash Functions II

    1. Yu Sasaki, Kazumaro Aoki
      Pages 253-271
    2. Michael Backes, Dominique Unruh
      Pages 290-307
  8. Public-Key Cryptography I

    1. Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
      Pages 326-343
    2. Christian Schridde, Bernd Freisleben
      Pages 344-354
    3. Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
      Pages 355-371
  9. Lattice-Based Cryptography

  10. Private-Key Cryptography

  11. Public-Key Cryptography II

    1. Dan Boneh, Michael Hamburg
      Pages 455-470
    2. Jung Hee Cheon, Jin Hong, Minkyu Kim
      Pages 471-488
    3. Andy Rupp, Gregor Leander, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi
      Pages 489-505
    4. Michael Backes, Markus Dürmuth, Dominique Unruh
      Pages 506-523
  12. Analysis of Stream Ciphers

    1. Jung-Keun Lee, Dong Hoon Lee, Sangwoo Park
      Pages 524-538
    2. Orr Dunkelman, Nathan Keller
      Pages 539-556
    3. Martin Hell, Thomas Johansson
      Pages 557-569
  13. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008.

The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.


anonymity block ciphers concurrent security cryptanalysis cryptographic attacks cryptographic protocols cryptography cryptology data security digital signature schemes electronic voting generic algorithms graph colorin hash function information security

Editors and affiliations

  • Josef Pieprzyk
    • 1
  1. 1.Department of ComputingMacquarie UniversitySydneyAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-89254-0
  • Online ISBN 978-3-540-89255-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software