Skip to main content
main-content

Über dieses Buch

This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels.

Inhaltsverzeichnis

Frontmatter

Block Ciphers

2009 | OriginalPaper | Buchkapitel

Related-Key Cryptanalysis of the Full AES-192 and AES-256

Alex Biryukov, Dmitry Khovratovich

2009 | OriginalPaper | Buchkapitel

The Key-Dependent Attack on Block Ciphers

Xiaorui Sun, Xuejia Lai

2009 | OriginalPaper | Buchkapitel

Cascade Encryption Revisited

Peter Gaži, Ueli Maurer

Quantum and Post-Quantum

2009 | OriginalPaper | Buchkapitel

Quantum-Secure Coin-Flipping and Applications

Ivan Damgård, Carolin Lunemann

2009 | OriginalPaper | Buchkapitel

On the Power of Two-Party Quantum Cryptography

Louis Salvail, Christian Schaffner, Miroslava Sotáková

2009 | OriginalPaper | Buchkapitel

Security Bounds for the Design of Code-Based Cryptosystems

Matthieu Finiasz, Nicolas Sendrier

Hash Functions I

2009 | OriginalPaper | Buchkapitel

Rebound Attack on the Full Lane Compression Function

Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolić, Yu Sasaki, Martin Schläffer

2009 | OriginalPaper | Buchkapitel

Rebound Distinguishers: Results on the Full Whirlpool Compression Function

Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer

2009 | OriginalPaper | Buchkapitel

MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners

Florian Mendel, Christian Rechberger, Martin Schläffer

2009 | OriginalPaper | Buchkapitel

The Intel AES Instructions Set and the SHA-3 Candidates

Ryad Benadjila, Olivier Billet, Shay Gueron, Matt J. B. Robshaw

Encryption Schemes

2009 | OriginalPaper | Buchkapitel

Group Encryption: Non-interactive Realization in the Standard Model

Julien Cathalo, Benoît Libert, Moti Yung

2009 | OriginalPaper | Buchkapitel

On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations

Jonathan Katz, Arkady Yerukhimovich

2009 | OriginalPaper | Buchkapitel

Hierarchical Predicate Encryption for Inner-Products

Tatsuaki Okamoto, Katsuyuki Takashima

2009 | OriginalPaper | Buchkapitel

Hedged Public-Key Encryption: How to Protect against Bad Randomness

Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek

Multi Party Computation

2009 | OriginalPaper | Buchkapitel

Secure Two-Party Computation Is Practical

Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams

2009 | OriginalPaper | Buchkapitel

Secure Multi-party Computation Minimizing Online Rounds

Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung

2009 | OriginalPaper | Buchkapitel

Improved Non-committing Encryption with Applications to Adaptively Secure Protocols

Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee

Cryptographic Protocols

2009 | OriginalPaper | Buchkapitel

Non-malleable Statistically Hiding Commitment from Any One-Way Function

Zongyang Zhang, Zhenfu Cao, Ning Ding, Rong Ma

2009 | OriginalPaper | Buchkapitel

Proofs of Storage from Homomorphic Identification Protocols

Giuseppe Ateniese, Seny Kamara, Jonathan Katz

2009 | OriginalPaper | Buchkapitel

Simple Adaptive Oblivious Transfer without Random Oracle

Kaoru Kurosawa, Ryo Nojima

Hash Functions II

2009 | OriginalPaper | Buchkapitel

Improved Generic Algorithms for 3-Collisions

Antoine Joux, Stefan Lucks

2009 | OriginalPaper | Buchkapitel

A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical

Anja Lehmann, Stefano Tessaro

2009 | OriginalPaper | Buchkapitel

How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!

Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta

Models and Frameworks I

2009 | OriginalPaper | Buchkapitel

On the Analysis of Cryptographic Assumptions in the Generic Ring Model

Tibor Jager, Jörg Schwenk

2009 | OriginalPaper | Buchkapitel

Zero Knowledge in the Random Oracle Model, Revisited

Hoeteck Wee

2009 | OriginalPaper | Buchkapitel

A Framework for Universally Composable Non-committing Blind Signatures

Masayuki Abe, Miyako Ohkubo

Cryptanalysis: Sqaure and Quadratic

2009 | OriginalPaper | Buchkapitel

Cryptanalysis of the Square Cryptosystems

Olivier Billet, Gilles Macario-Rat

2009 | OriginalPaper | Buchkapitel

Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses

Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie, Phong Q. Nguyen

2009 | OriginalPaper | Buchkapitel

Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?

Mathias Herrmann, Alexander May

Models and Frameworks II

2009 | OriginalPaper | Buchkapitel

Security Notions and Generic Constructions for Client Puzzles

Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi

2009 | OriginalPaper | Buchkapitel

Foundations of Non-malleable Hash and One-Way Functions

Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi

Hash Functions III

2009 | OriginalPaper | Buchkapitel

Improved Cryptanalysis of Skein

Jean-Philippe Aumasson, Çağdaş Çalık, Willi Meier, Onur Özen, Raphael C. -W. Phan, Kerem Varıcı

2009 | OriginalPaper | Buchkapitel

Linearization Framework for Collision Attacks: Application to CubeHash and MD6

Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin

2009 | OriginalPaper | Buchkapitel

Preimages for Step-Reduced SHA-2

Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang

Lattice-Based

2009 | OriginalPaper | Buchkapitel

Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures

Vadim Lyubashevsky

2009 | OriginalPaper | Buchkapitel

Efficient Public Key Encryption Based on Ideal Lattices

(Extended Abstract)
Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa

2009 | OriginalPaper | Buchkapitel

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices

Jonathan Katz, Vinod Vaikuntanathan

Side Channels

2009 | OriginalPaper | Buchkapitel

PSS Is Secure against Random Fault Attacks

Jean-Sébastien Coron, Avradip Mandal

2009 | OriginalPaper | Buchkapitel

Cache-Timing Template Attacks

Billy Bob Brumley, Risto M. Hakala

2009 | OriginalPaper | Buchkapitel

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions

Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls

2009 | OriginalPaper | Buchkapitel

Signature Schemes with Bounded Leakage Resilience

Jonathan Katz, Vinod Vaikuntanathan

Backmatter

Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.

Whitepaper

- ANZEIGE -

Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!

Bildnachweise