Advertisement

Advances in Cryptology – ASIACRYPT 2012

18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

  • Xiaoyun Wang
  • Kazue Sako

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7658)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Public-Key Cryptography I

    1. Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
      Pages 4-24
    2. Michael Gerbush, Allison Lewko, Adam O’Neill, Brent Waters
      Pages 25-42
    3. Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
      Pages 43-60
  4. Foundation

    1. Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
      Pages 98-115
    2. Yehuda Lindell, Eran Omri, Hila Zarosim
      Pages 116-133
    3. Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
      Pages 134-153
  5. Symmetric Cipher

    1. Meicheng Liu, Yin Zhang, Dongdai Lin
      Pages 172-189
    2. Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varıcı
      Pages 190-207
    3. Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen et al.
      Pages 208-225
    4. Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang
      Pages 244-261
    5. Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling
      Pages 262-277
  6. Security Proof

    1. Rodolphe Lampe, Jacques Patarin, Yannick Seurin
      Pages 278-295
    2. Liting Zhang, Wenling Wu, Han Sui, Peng Wang
      Pages 296-312
    3. Dimitar Jetchev, Onur Özen, Martijn Stam
      Pages 313-330
    4. Mihir Bellare, Kenneth G. Paterson, Susan Thomson
      Pages 331-348
  7. Public-Key Cryptography II

    1. Tatsuaki Okamoto, Katsuyuki Takashima
      Pages 349-366
    2. Nuttapong Attrapadung, Benoît Libert, Thomas Peters
      Pages 367-385
    3. Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn
      Pages 386-403
    4. Saqib A. Kakvi, Eike Kiltz, Alexander May
      Pages 404-414
  8. Lattice-Based Cryptography and Number Theory

    1. Christophe Petit, Jean-Jacques Quisquater
      Pages 451-466
  9. Public-Key Cryptography III

    1. Joppe W. Bos, Thorsten Kleinjung
      Pages 467-484
    2. Nico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento
      Pages 485-503
  10. Hash Function

  11. Cryptographic Protocol I

    1. Takaaki Mizuki, Michihito Kumamoto, Hideaki Sone
      Pages 598-606
    2. Shahram Khazaei, Tal Moran, Douglas Wikström
      Pages 607-625
    3. David Bernhard, Olivier Pereira, Bogdan Warinschi
      Pages 626-643
  12. Cryptographic Protocol II

    1. Kyle Brogle, Sharon Goldberg, Leonid Reyzin
      Pages 644-662
    2. Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes
      Pages 663-680
    3. Gilad Asharov, Claudio Orlandi
      Pages 681-698
    4. Rafael Pass, Huijia Lin, Muthuramakrishnan Venkitasubramaniam
      Pages 699-717
  13. Implementation Issues

    1. Patrick Longa, Francesco Sica
      Pages 718-739
    2. Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof, François-Xavier Standaert
      Pages 740-757
    3. Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede
      Pages 758-775
  14. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012.

The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Keywords

collision attack elliptic curve cryptography homomorphic signatures pairing-based cryptosystems secure computation secure computation

Editors and affiliations

  • Xiaoyun Wang
    • 1
  • Kazue Sako
    • 2
  1. 1.Tsinghua UniversityBeijingChina
  2. 2.Central Research LaboratoriesNECKawasakiJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-34961-4
  • Copyright Information International Association for Cryptologic Research 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34960-7
  • Online ISBN 978-3-642-34961-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace