ASIACRYPT 2010:
Masayuki Abe (Ed.):
Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010,
Singapore,
December 5-9, 2010
Proceedings.
ASIACRYPT 2010
December 5-9, 2010
Organizational Committee
Program Chairs : | Masayuki Abe | |
General Chair : | San Ling |
Program Committee
Claude Carlet |
Jean-Sébastien Coron |
Yevgeniy Dodis |
Marc Fischlin |
Henri Gilbert |
Dennis Hofheinz |
Thomas Johansson |
Antoine Joux |
Jonathan Katz |
Lars R. Knudsen |
Kaoru Kurosawa |
Xuejia Lai |
Dong Hoon Lee |
Anna Lysyanskaya |
Vadim Lyubashevsky |
Mitsuru Matsui |
Payman Mohassel |
Phong Q. Nguyen |
Jesper Buus Nielsen |
Kaisa Nyberg |
Elisabeth Oswald |
Renato Renner |
Vincent Rijmen |
Thomas Shrimpton |
Nigel P. Smart |
François-Xavier Standaert |
Ron Steinfeld |
Willy Susilo |
Vinod Vaikuntanathan |
Serge Vaudenay |
Hoeteck Wee |
Hongjun Wu |
Kan Yasuda |
Hong-Sheng Zhou |
External Referees
-
Hash Attacks
-
Rotational Rebound Attacks on Reduced Skein.
, 1-19,
Christian Rechberger
,
Dmitry Khovratovich
,
Ivica Nikolic
bib info -
Finding Second Preimages of Short Messages for Hamsi-256.
, 20-37,
Thomas Fuhr
bib info -
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl.
, 38-55,
Kazuo Ohta
,
Yu Sasaki
,
Kazuo Sakiyama
,
Lei Wang
,
Yang Li
bib info -
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
, 56-75,
Christian Rechberger
,
Huaxiong Wang
,
Jian Guo
,
San Ling
bib info -
Collision Attacks against the Knudsen-Preneel Compression Functions.
, 76-93,
Martijn Stam
,
Onur Özen
bib info
-
Rotational Rebound Attacks on Reduced Skein.
, 1-19,
Christian Rechberger
,
Dmitry Khovratovich
,
Ivica Nikolic
-
Symmetric-Key Cryptosystems
-
Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.
, 94-111,
Jacques Patarin
,
Valérie Nachef
,
Emmanuel Volte
bib info -
The World Is Not Enough: Another Look on Second-Order DPA.
, 112-129,
Stefan Mangard
,
Elisabeth Oswald
,
François-Xavier Standaert
,
Benedikt Gierlichs
,
Marcel Medwed
,
Nicolas Veyrat-Charvillon
,
Markus Kasper
bib info
-
Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.
, 94-111,
Jacques Patarin
,
Valérie Nachef
,
Emmanuel Volte
-
Block and Stream Ciphers
-
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems.
, 130-145,
Willi Meier
,
María Naya-Plasencia
,
Simon Knellwolf
bib info -
A Byte-Based Guess and Determine Attack on SOSEMANUK.
, 146-157,
Dengguo Feng
,
Xiutao Feng
,
Chuankun Wu
,
Jun Liu
,
Zhaocun Zhou
bib info -
Improved Single-Key Attacks on 8-Round AES-192 and AES-256.
, 158-176,
Orr Dunkelman
,
Nathan Keller
,
Adi Shamir
bib info
-
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems.
, 130-145,
Willi Meier
,
María Naya-Plasencia
,
Simon Knellwolf
-
Protocols
-
Constant-Size Commitments to Polynomials and Their Applications.
, 177-194,
Ian Goldberg
,
Gregory M. Zaverucha
,
Aniket Kate
bib info -
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries.
, 195-212,
Tomas Toft
,
Carmit Hazay
bib info -
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
, 213-231,
Gene Tsudik
,
Jihye Kim
,
Emiliano De Cristofaro
bib info
-
Constant-Size Commitments to Polynomials and Their Applications.
, 177-194,
Ian Goldberg
,
Gregory M. Zaverucha
,
Aniket Kate
- Key Exchange
-
Foundation
-
Efficient String-Commitment from Weak Bit-Commitment.
, 268-282,
Chi-Jen Lu
,
Bo-Yin Yang
,
Kai-Min Chung
,
Feng-Hao Liu
bib info -
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields.
, 283-302,
Robert Granger
bib info -
Random Oracles with(out) Programmability.
, 303-320,
Thomas Ristenpart
,
Marc Fischlin
,
Thomas Shrimpton
,
Martijn Stam
,
Anja Lehmann
,
Stefano Tessaro
bib info
-
Efficient String-Commitment from Weak Bit-Commitment.
, 268-282,
Chi-Jen Lu
,
Bo-Yin Yang
,
Kai-Min Chung
,
Feng-Hao Liu
- Zero-Knowledge
- Lattice-Based Cryptography
-
Secure Communication and Computation
-
The Round Complexity of Verifiable Secret Sharing: The Statistical Case.
, 431-447,
C. Pandu Rangan
,
Ranjit Kumaresan
,
Arpita Patra
bib info -
General Perfectly Secure Message Transmission Using Linear Codes.
, 448-465,
Yvo Desmedt
,
Qiushi Yang
bib info -
On Invertible Sampling and Adaptive Security.
, 466-482,
Amit Sahai
,
Yuval Ishai
,
Claudio Orlandi
,
Abishek Kumarasubramanian
bib info -
Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition.
, 483-500,
Chao Ning
,
Qiuliang Xu
bib info
-
The Round Complexity of Verifiable Secret Sharing: The Statistical Case.
, 431-447,
C. Pandu Rangan
,
Ranjit Kumaresan
,
Arpita Patra
-
Models, Notions, and Assumptions
-
A Closer Look at Anonymity and Robustness in Encryption Schemes.
, 501-518,
Payman Mohassel
bib info -
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.
, 519-538,
Hovav Shacham
,
David Mandell Freeman
,
Sarah Meiklejohn
bib info -
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.
, 539-556,
Andy Rupp
,
Tibor Jager
bib info
-
A Closer Look at Anonymity and Robustness in Encryption Schemes.
, 501-518,
Payman Mohassel
-
Public-Key Encryption
-
The Degree of Regularity of HFE Systems.
, 557-576,
Vivien Dubois
,
Nicolas Gama
bib info -
Structured Encryption and Controlled Disclosure.
, 577-594,
Melissa Chase
,
Seny Kamara
bib info -
Leakage Resilient ElGamal Encryption.
, 595-612,
Eike Kiltz
,
Krzysztof Pietrzak
bib info -
Efficient Public-Key Cryptography in the Presence of Key Leakage.
, 613-631,
Yevgeniy Dodis
,
Daniel Wichs
,
Kristiyan Haralambiev
,
Adriana López-Alt
bib info
-
The Degree of Regularity of HFE Systems.
, 557-576,
Vivien Dubois
,
Nicolas Gama