The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Author(s): Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.)
Series: Lecture Notes in Computer Science 8269 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2013
Language: English
Pages: 546
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Discrete Mathematics in Computer Science; Systems and Data Security; Applications of Mathematics
Front Matter....Pages -
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces....Pages 1-20
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model....Pages 21-40
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes....Pages 41-60
Families of Fast Elliptic Curves from ℚ-curves....Pages 61-78
Four-Dimensional GLV via the Weil Restriction....Pages 79-96
Discrete Gaussian Leftover Hash Lemma over Infinite Domains....Pages 97-116
New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography....Pages 117-133
Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited....Pages 134-153
Reset Indifferentiability and Its Consequences....Pages 154-173
Computational Fuzzy Extractors....Pages 174-193
Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization....Pages 194-213
SPHF-Friendly Non-interactive Commitments....Pages 214-234
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency....Pages 235-254
Function-Private Subspace-Membership Encryption and Its Applications....Pages 255-275
Random Projections, Graph Sparsification, and Differential Privacy....Pages 276-295
Notions of Black-Box Reductions, Revisited....Pages 296-315
Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments....Pages 316-336
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES 2 ....Pages 337-356
Key Difference Invariant Bias in Block Ciphers....Pages 357-376
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE....Pages 377-404
A Modular Framework for Building Variable-Input-Length Tweakable Ciphers....Pages 405-423
Parallelizable and Authenticated Online Ciphers....Pages 424-443
How to Construct an Ideal Cipher from a Small Set of Public Permutations....Pages 444-463
Generic Key Recovery Attack on Feistel Scheme....Pages 464-485
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests....Pages 486-505
Behind the Scene of Side Channel Attacks....Pages 506-525
SCARE of Secret Ciphers with SPN Structures....Pages 526-544
Back Matter....Pages -