Advertisement

Advances in Cryptology – ASIACRYPT 2011

17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

  • Dong Hoon Lee
  • Xiaoyun Wang

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7073)

Table of contents

  1. Front Matter
  2. Lattices and Quantum Cryptography

    1. Yuanmi Chen, Phong Q. Nguyen
      Pages 1-20
    2. Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
      Pages 21-40
    3. Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
      Pages 41-69
  3. Public Key Encryption I

    1. Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud
      Pages 70-88
    2. Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens
      Pages 89-106
    3. Alexander May, Alexander Meurer, Enrico Thomae
      Pages 107-124
    4. Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
      Pages 125-142
  4. Public Key Encryption II

    1. Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farràs
      Pages 143-160
    2. Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson
      Pages 161-178
    3. Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret
      Pages 179-196
  5. Database Privacy

    1. Elaine Shi, T. -H. Hubert Chan, Emil Stefanov, Mingfei Li
      Pages 197-214
    2. Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta
      Pages 215-232
  6. Hash Function

    1. Frederik Armknecht, Ewan Fleischmann, Matthias Krause, Jooyoung Lee, Martijn Stam, John Steinberger
      Pages 233-251
    2. María Naya-Plasencia, Deniz Toz, Kerem Varici
      Pages 252-269
    3. Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolić
      Pages 270-287
    4. Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 288-307
  7. Symmetric Key Encryption

    1. Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner
      Pages 308-326
    2. Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
      Pages 327-343
    3. Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
      Pages 344-371
    4. Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton
      Pages 372-389
  8. Zero Knowledge Proof

    1. Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung
      Pages 390-406
    2. Claude Crépeau, Louis Salvail, Jean-Raymond Simard, Alain Tapp
      Pages 407-430
  9. Universal Composability

  10. Foundation

    1. Mihir Bellare, David Cash, Rachel Miller
      Pages 486-503
    2. Pierrick Gaudry, David Kohel, Benjamin Smith
      Pages 504-519
    3. Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger
      Pages 520-537
    4. Qiushi Yang, Yvo Desmedt
      Pages 538-555
  11. Secure Computation and Secret Sharing

    1. Michael Backes, Aniket Kate, Arpita Patra
      Pages 590-609
    2. Oriol Farràs, Carles Padró, Chaoping Xing, An Yang
      Pages 610-627
  12. Public Key Signature

    1. Masayuki Abe, Jens Groth, Miyako Ohkubo
      Pages 628-646
    2. Dennis Hofheinz, Tibor Jager, Eike Kiltz
      Pages 647-666
    3. Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat
      Pages 667-685
  13. Leakage Resilient Cryptography

    1. Stefan Dziembowski, Sebastian Faust
      Pages 702-721
    2. Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum
      Pages 722-739
    3. Seung Geol Choi, Aggelos Kiayias, Tal Malkin
      Pages 740-758
  14. Back Matter

About these proceedings

Introduction

This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011.
The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.

Keywords

cryptanalysis cryptography hash functions reliable communication verifiable secret sharing

Editors and affiliations

  • Dong Hoon Lee
    • 1
  • Xiaoyun Wang
    • 2
  1. 1.Center for Information Security TechnologiesKorea UniversitySeoulSouth Korea
  2. 2.Shandong UniversityChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-25385-0
  • Copyright Information International Association for Cryptologic Research 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-25384-3
  • Online ISBN 978-3-642-25385-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace