Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Author(s): Dan Boneh (auth.), Xiaoyun Wang, Kazue Sako (eds.)
Series: Lecture Notes in Computer Science 7658
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2012

Language: English
Pages: 780
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Discrete Mathematics in Computer Science; Systems and Data Security; Applications of Mathematics

Front Matter....Pages -
Pairing-Based Cryptography: Past, Present, and Future....Pages 1-1
Some Mathematical Mysteries in Lattices....Pages 2-3
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions....Pages 4-24
Dual Form Signatures: An Approach for Proving Security from Static Assumptions....Pages 25-42
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF (3 97 )....Pages 43-60
On the (Im)possibility of Projecting Property in Prime-Order Setting....Pages 61-79
Optimal Reductions of Some Decisional Problems to the Rank Problem....Pages 80-97
Signature Schemes Secure against Hard-to-Invert Leakage....Pages 98-115
Completeness for Symmetric Two-Party Functionalities - Revisited....Pages 116-133
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing....Pages 134-153
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions....Pages 154-171
Perfect Algebraic Immune Functions....Pages 172-189
Differential Analysis of the LED Block Cipher....Pages 190-207
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications....Pages 208-225
Analysis of Differential Attacks in ARX Constructions....Pages 226-243
Integral and Multidimensional Linear Distinguishers with Correlation Zero....Pages 244-261
Differential Attacks against Stream Cipher ZUC....Pages 262-277
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher....Pages 278-295
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound....Pages 296-312
Understanding Adaptivity: Random Systems Revisited....Pages 313-330
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures....Pages 331-348
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption....Pages 349-366
Computing on Authenticated Data: New Privacy Definitions and Constructions....Pages 367-385
A Coding-Theoretic Approach to Recovering Noisy RSA Keys....Pages 386-403
Certifying RSA....Pages 404-414
Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic....Pages 415-432
Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures....Pages 433-450
On Polynomial Systems Arising from a Weil Descent....Pages 451-466
ECM at Work....Pages 467-484
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem....Pages 485-503
Provable Security of the Knudsen-Preneel Compression Functions....Pages 504-525
Optimal Collision Security in Double Block Length Hashing with Single Length Key....Pages 526-543
Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings....Pages 544-561
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks....Pages 562-579
Generic Related-Key Attacks for HMAC....Pages 580-597
The Five-Card Trick Can Be Done with Four Cards....Pages 598-606
A Mix-Net from Any CCA2 Secure Cryptosystem....Pages 607-625
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios....Pages 626-643
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations....Pages 644-662
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise....Pages 663-680
Calling Out Cheaters: Covert Security with Public Verifiability....Pages 681-698
A Unified Framework for UC from Only OT....Pages 699-717
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication....Pages 718-739
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note....Pages 740-757
Theory and Practice of a Leakage Resilient Masking Scheme....Pages 758-775
Erratum: Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks....Pages E1-E1
Back Matter....Pages -