ASIACRYPT 2008:
Josef Pieprzyk (Ed.):
Advances in Cryptology - ASIACRYPT 2008 - ASIACRYPT 2008,
14th International Conference on the Theory and Application of Cryptology and Information Security,
Melbourne, Australia,
December 7-11, 2008
Proceedings.
ASIACRYPT 2008
Melbourne, Australia,
December 7-11, 2008
Organizational Committee
Program Chairs : | Josef Pieprzyk, Macquarie University, Australia |
General Chair : | Lynn Batten, Deakin University, Australia |
Sponsored by
the International Association for Cryptologic Research
in co-operation with
School of Engineerring and Information Technology, Deakin University
Center for Advanced Computing -- Cryptography and Algorithms, Macquarie University
Research Network for a Secure Australia
SECIA
Program Committee
Masayuki Abe |
Josh Benaloh |
Daniel Bernstein |
Colin Boyd |
Claude Carlet |
Scott Contini |
Nicolas Courtois |
Claus Diem |
Christophe Doche |
Stefan Dziembowski |
Serge Fehr |
Jovan Golic |
Jonatahn Katz |
Kaoru Kurosawa |
Tanja Lange |
Byoungcheon Lee |
Arjen K. Lenstra |
Keith Martin |
Mitsuru Matsui |
Tsutomu Matsumoto |
Siguna Mueller |
Kaisa Nyberg |
Eiji Okamoto |
Tatsuaki Okamoto |
Pascal Paillier |
Jacques Patarin |
David Pointcheval |
Manoj Prabhakaran |
Bart Preneel |
C. Pandu Rangan |
Vincent Rijmen |
Phillip Rogaway |
Bimal Roy |
Rei Safavi-Naini |
Palash Sarkar |
Ron Steinfeld |
Huaxiong Wang |
Yuliang Zheng |
External Referees
MULTI-PARTY COMPUTATION
-
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes.
, 19-36,
Huaxiong Wang
,
Zhifang Zhang
,
Mulan Liu
,
Yeow Meng Chee
,
San Ling
bib info -
Graph Design for Secure Multiparty Computation over Non-Abelian Groups.
, 37-53,
Andrew Chi-Chih Yao
,
Christophe Tartary
,
Xiaoming Sun
bib info
INVITED TALK
CRYPTOGRAPHIC PROTOCOLS
-
A Modular Security Analysis of the TLS Handshake Protocol.
, 55-73,
Nigel P. Smart
,
Bogdan Warinschi
,
Paul Morrissey
bib info -
Ambiguous Optimistic Fair Exchange.
, 74-89,
Willy Susilo
,
Duncan S. Wong
,
Guomin Yang
,
Qiong Huang
bib info -
Compact Proofs of Retrievability.
, 90-107,
Hovav Shacham
,
Brent Waters
bib info -
On the Security of HB# against a Man-in-the-Middle Attack.
, 108-124,
Serge Vaudenay
,
Raphael Overbeck
,
Khaled Ouafi
bib info
CRYPTOGRAPHIC HASH FUNCTIONS I
-
Hash Functions from Sigma Protocols and Improvements to VSH.
, 125-142,
Mihir Bellare
,
Todor Ristov
bib info -
Slide Attacks on a Class of Hash Functions.
, 143-160,
Stefan Lucks
,
Thomas Peyrin
,
Michael Gorski
bib info -
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography.
, 161-178,
Ueli M. Maurer
,
Stefano Tessaro
bib info
-
Universally Composable Adaptive Oblivious Transfer.
, 179-197,
Matthew Green
,
Susan Hohenberger
bib info NULL -
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting.
, 198-215,
Joe Kilian
,
Jason Keller
bib info -
Towards Robust Computation on Encrypted Data.
, 216-233,
Manoj Prabhakaran
,
Mike Rosulek
bib info -
Efficient Protocols for Set Membership and Range Proofs.
, 234-252,
Jan Camenisch
,
Abhi Shelat
,
Rafik Chaabouni
bib info
-
Preimage Attacks on 3, 4, and 5-Pass HAVAL.
, 253-271,
Kazumaro Aoki
,
Yu Sasaki
bib info -
Limits of Constructive Security Proofs.
, 290-307,
Dominique Unruh
,
Michael Backes
bib info
-
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.
, 308-325,
Kaoru Kurosawa
,
Goichiro Hanaoka
bib info -
Twisted Edwards Curves Revisited.
, 326-343,
Gary Carter
,
Ed Dawson
,
Hüseyin Hisil
,
Kenneth Koon-Ho Wong
bib info -
Chosen Ciphertext Security with Optimal Ciphertext Overhead.
, 355-371,
Masayuki Abe
,
Tatsuaki Okamoto
,
Eike Kiltz
bib info
-
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems.
, 372-389,
Keisuke Tanaka
,
Akinori Kawachi
,
Keita Xagawa
bib info -
Rigorous and Efficient Short Lattice Vectors Enumeration.
, 390-405,
Damien Stehlé
,
Xavier Pujol
bib info -
Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits.
, 406-424,
Alexander May
,
Mathias Herrmann
bib info
-
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity.
, 425-440,
Claude Carlet
,
Keqin Feng
bib info -
An Improved Impossible Differential Attack on MISTY1.
, 441-454,
Orr Dunkelman
,
Nathan Keller
bib info
-
Generalized Identity Based and Broadcast Encryption Schemes.
, 455-470,
Dan Boneh
,
Michael Hamburg
bib info -
Speeding Up the Pollard Rho Method on Prime Fields.
, 471-488,
Jung Hee Cheon
,
Jin Hong
,
Minkyu Kim
bib info -
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
, 489-505,
Alexander W. Dent
,
Gregor Leander
,
Andy Rupp
,
Ahmad-Reza Sadeghi
,
Endre Bangerter
bib info -
OAEP Is Secure under Key-Dependent Messages.
, 506-523,
Dominique Unruh
,
Michael Backes
,
Markus Dürmuth
bib info
-
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks.
, 524-538,
Sangwoo Park
,
Jung-Keun Lee
,
Dong Hoon Lee 0002
bib info -
A New Attack on the LEX Stream Cipher.
, 539-556,
Orr Dunkelman
,
Nathan Keller
bib info -
Breaking the F-FCSR-H Stream Cipher in Real Time.
, 557-569,
Thomas Johansson
,
Martin Hell
bib info
Author Index