Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Author(s): Palash Sarkar, Tetsu Iwata (eds.)
Series: Lecture Notes in Computer Science 8873 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2014

Language: English
Pages: 574
Tags: Data Encryption; Systems and Data Security; Coding and Information Theory; Management of Computing and Information Systems; Theory of Computation; Mathematics of Computing

Front Matter....Pages -
Solving LPN Using Covering Codes....Pages 1-20
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form....Pages 21-41
Bivariate Polynomials Modulo Composites and Their Applications....Pages 42-62
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)....Pages 63-84
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes....Pages 85-104
How to Securely Release Unverified Plaintext in Authenticated Encryption....Pages 105-125
Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET....Pages 126-140
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 ....Pages 141-157
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers....Pages 158-178
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon ....Pages 179-199
A Simplified Representation of AES....Pages 200-222
Simulatable Leakage: Analysis, Pitfalls, and New Constructions....Pages 223-242
Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer....Pages 243-261
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias....Pages 262-281
Soft Analytical Side-Channel Attacks....Pages 282-296
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography....Pages 297-316
Kummer Strikes Back: New DH Speed Records....Pages 317-337
Jacobian Coordinates on Genus 2 Curves....Pages 338-357
Mersenne Factorization Factory....Pages 358-377
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms....Pages 378-397
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)....Pages 398-419
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE....Pages 420-438
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys....Pages 439-457
Meet-in-the-Middle Attacks on Generic Feistel Constructions....Pages 458-477
XLS is Not a Strong Pseudorandom Permutation....Pages 478-490
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials....Pages 491-511
On Tight Security Proofs for Schnorr Signatures....Pages 512-531
Square Span Programs with Applications to Succinct NIZK Arguments....Pages 532-550
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures....Pages 551-572
Back Matter....Pages -