Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Author(s): Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.)
Series: Lecture Notes in Computer Science 8270 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2013

Language: English
Pages: 542
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Discrete Mathematics in Computer Science; Systems and Data Security; Applications of Mathematics

Front Matter....Pages -
New Generic Attacks against Hash-Based MACs....Pages 1-20
Cryptanalysis of HMAC/NMAC-Whirlpool ....Pages 21-40
Lattice-Based Group Signatures with Logarithmic Signature Size....Pages 41-61
The Fiat–Shamir Transformation in a Quantum World....Pages 62-81
On the Security of One-Witness Blind Signature Schemes....Pages 82-99
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions....Pages 100-119
Functional Encryption from (Small) Hardware Tokens....Pages 120-139
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier....Pages 140-160
Tamper Resilient Circuits: The Adversary at the Gates....Pages 161-180
Efficient General-Adversary Multi-Party Computation....Pages 181-200
Fair and Efficient Secure Multiparty Computation with Reputation Systems....Pages 201-220
Between a Rock and a Hard Place: Interpolating between MPC and FHE....Pages 221-240
Building Lossy Trapdoor Functions from Lossy Encryption....Pages 241-260
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters....Pages 261-279
Constrained Pseudorandom Functions and Their Applications....Pages 280-300
Fully Homomorphic Message Authenticators....Pages 301-320
Non-uniform Cracks in the Concrete: The Power of Free Precomputation....Pages 321-340
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild....Pages 341-360
Naturally Rehearsing Passwords....Pages 361-380
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter....Pages 381-400
On Continual Leakage of Discrete Log Representations....Pages 401-420
Hiding the Input-Size in Secure Two-Party Computation....Pages 421-440
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique....Pages 441-463
A Heuristic for Finding Compatible Differential Paths with Application to HAS-160....Pages 464-483
Improved Cryptanalysis of Reduced RIPEMD-160....Pages 484-503
Limited-Birthday Distinguishers for Hash Functions....Pages 504-523
On Diamond Structures and Trojan Message Attacks....Pages 524-539
Back Matter....Pages -