ASIACRYPT 2015:
Tetsu Iwata and Jung Hee Cheon (Eds.):
Advances in Cryptology
ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security
Auckland, New Zealand,
November 29 - December 3, 2015,
Proceedings.
ASIACRYPT 2015
Organizational Committee
Program Chairs : | Tetsu Iwata and Jung Hee Cheon | |
General Chair : | Steven Galbraith |
Program Committee
Daniel J. Bernstein |
Ignacio Cascudo |
Chen-Mou Cheng |
Sherman S. M. Chow |
Kai-Min Chung |
Nico Döttling |
Jens Groth |
Dawu Gu |
Dong-Guk Han |
Marc Joye |
Nathan Keller |
Aggelos Kiayias |
Kaoru Kurosawa |
Xuejia Lai |
Hyang-Sook Lee |
Jooyoung Lee |
Arjen K. Lenstra |
Hemanta K. Maji |
Alexander May |
Bart Mennink |
Tatsuaki Okamoto |
Raphael C.-W. Phan |
Josef Pieprzyk |
Bart Preneel |
Damien Robert |
Ahmad-Reza Sadeghi |
Reihaneh Safavi-Naini |
Palash Sarkar |
Yu Sasaki |
Peter Schwabe |
Jae Hong Seo |
Nigel P. Smart |
Damien Stehlé |
Tsuyoshi Takagi |
Mehdi Tibouchi |
Dominique Unruh |
Serge Vaudenay |
Huaxiong Wang |
Hongjun Wu |
Vassilis Zikas |
-
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
, 113-133,
Mridul Nandi
bib info -
Efficient Fully Structure-Preserving Signatures for Large Messages
, 239-259,
Jens Groth
bib info -
Optimized Interpolation Attacks on LowMC
, 535-560,
Willi Meier
,
Itai Dinur
,
Qingju Wang
,
Yunwen Liu
bib info -
Property Preserving Symmetric Encryption Revisited
, 658-682,
Sanjit Chatterjee
,
M. Prem Laxman Das
bib info -
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
, 605-629,
Alejandro Hevia
,
Carla Ràfols
,
Alonso González
bib info -
Multiple Discrete Logarithm Problems with Auxiliary Inputs
, 174-188,
Taechan Kim
bib info -
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
, 415-442,
Goichiro Hanaoka
,
Takahiro Matsuda
bib info -
Implementing Candidate Graded Encoding Schemes from Ideal Lattices
, 752-775,
Fabien Laguillaumie
,
Martin R. Albrecht
,
Adeline Langlois
,
Catalin Cocis
bib info -
Computing Individual Discrete Logarithms Faster in GF(p n ) with the NFS-DL Algorithm
, 149-173,
Aurore Guillevic
bib info -
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
, 630-655,
Charanjit S. Jutla
,
Arnab Roy
bib info -
Riding on Asymmetry: Efficient ABE for Branching Programs
, 550-574,
Sergey Gorbunov
,
Dhinakaran Vinayagamurthy
bib info -
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
, 79-102,
Susan Hohenberger
,
Brent Waters
,
Venkata Koppula
bib info -
The Tower Number Field Sieve
, 31-55,
Pierrick Gaudry
,
Thorsten Kleinjung
,
Razvan Barbulescu
bib info -
A Provably Secure Group Signature Scheme from Code-Based Assumptions
, 260-285,
Huaxiong Wang
,
San Ling
,
Khoa Nguyen
,
Hyung Tae Lee
,
Martianus Frederic Ezerman
bib info -
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
, 291-312,
François-Xavier Standaert
,
Vincent Grosso
bib info -
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
, 389-410,
Dongdai Lin
,
Chun Guo
bib info -
Type 2 Structure-Preserving Signature Schemes Revisited
, 286-310,
Sanjit Chatterjee
,
Alfred Menezes
bib info NULL -
Analysis of SHA-512/224 and SHA-512/256
, 612-630,
Florian Mendel
,
Maria Eichlseder
,
Christoph Dobraunig
bib info -
Refinements of the k-tree Algorithm for the Generalized Birthday Problem
, 683-703,
Yu Sasaki
,
Ivica Nikolic
bib info -
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance
, 3-24,
Ron Steinfeld
,
Adeline Langlois
,
Shi Bai
,
Tancrède Lepoint
,
Damien Stehlé
bib info -
Solving Linear Equations Modulo Unknown Divisors: Revisited
, 189-213,
Dongdai Lin
,
Yao Lu
,
Rui Zhang
,
Liqiang Peng
bib info -
Another Tradeoff Attack on Sprout-Like Stream Ciphers
, 561-585,
Bin Zhang
,
Xinxin Gong
bib info -
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
, 134-158,
Yannick Seurin
,
Benoît Cogliati
bib info -
Design Principles for HFEv- Based Multivariate Signature Schemes
, 311-334,
Bo-Yin Yang
,
Jintai Ding
,
Ming-Shing Chen
,
Albrecht Petzoldt
,
Chengdong Tao
bib info -
Counting Keys in Parallel After a Side Channel Attack
, 313-337,
Martijn Stam
,
Elisabeth Oswald
,
Daniel P. Martin
,
Jonathan F. O'Connell
bib info -
Idealizing Identity-Based Encryption
, 495-520,
Ueli M. Maurer
,
Dennis Hofheinz
,
Christian Matt
bib info -
On Black-Box Complexity of Universally Composable Security in the CRS Model
, 183-209,
Carmit Hazay
,
Muthuramakrishnan Venkitasubramaniam
bib info -
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
, 465-489,
Bart Mennink
,
Reza Reyhanitabar
,
Damian Vizár
bib info -
On the Impact of Known-Key Attacks on Hash Functions
, 59-84,
Bart Preneel
,
Bart Mennink
bib info -
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks
, 338-360,
Yunsi Fei
,
A. Adam Ding
,
Liwei Zhang
,
Pei Luo
bib info -
Tradeoff Cryptanalysis of Memory-Hard Functions
, 633-657,
Alex Biryukov
,
Dmitry Khovratovich
bib info -
How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase Transition
, 704-731,
Serge Vaudenay
,
Sonia Bogos
bib info -
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
, 490-509,
Florian Mendel
,
Maria Eichlseder
,
Christoph Dobraunig
bib info -
Generic Security of NMAC and HMAC with Input Whitening
, 85-109,
Krzysztof Pietrzak
,
Stefano Tessaro
,
Peter Gazi
bib info -
Selective Opening Security for Receivers
, 443-469,
Bogdan Warinschi
,
Carmit Hazay
,
Arpita Patra
bib info -
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
, 586-611,
Marc Stevens
,
Max Fillinger
bib info -
An Inverse-Free Single-Keyed Tweakable Enciphering Scheme
, 159-180,
Mridul Nandi
,
Ritam Bhaumik
bib info -
Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
, 681-707,
Benoît Libert
,
Moti Yung
,
Marc Joye
,
Thomas Peters
bib info -
Optimally Secure Block Ciphers from Ideal Primitives
, 437-462,
Stefano Tessaro
bib info -
A Unified Approach to MPC with Preprocessing Using OT
, 711-735,
Tore Kasper Frederiksen
,
Emmanuela Orsini
,
Marcel Keller
,
Peter Scholl
bib info -
How Secure is AES Under Leakage
, 361-385,
Andrey Bogdanov
,
Takanori Isobe
bib info -
New Circular Security Counterexamples from Decision Linear and Learning with Errors
, 776-800,
Susan Hohenberger
,
Brent Waters
,
Allison Bishop
bib info -
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions
, 262-288,
Jan Camenisch
,
Markulf Kohlweiss
,
Kristiyan Haralambiev
,
Maria Dubovitskaya
bib info -
Secret Sharing and Statistical Zero Knowledge
, 656-680,
Vinod Vaikuntanathan
,
Prashant Nalini Vasudevan
bib info -
Key-Recovery Attacks on ASASA
, 3-27,
Pierre-Alain Fouque
,
Patrick Derbez
,
Pierre Karpman
,
Brice Minaud
bib info -
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
, 337-359,
Dana Dachman-Soled
,
Elaine Shi
,
Charalampos Papamanthou
,
Chang Liu
,
Uzi Vishkin
bib info -
Secure Computation from Millionaire
, 736-757,
Abhi Shelat
,
Muthuramakrishnan Venkitasubramaniam
bib info -
Midori: A Block Cipher for Low Energy
, 411-436,
Andrey Bogdanov
,
Toru Akishita
,
Kyoji Shibutani
,
Takanori Isobe
,
Francesco Regazzoni
,
Harunaga Hiwatari
,
Subhadeep Banik
bib info -
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
, 121-145,
Tatsuaki Okamoto
,
Krzysztof Pietrzak
,
Brent Waters
,
Daniel Wichs
bib info -
On Cut-and-Choose Oblivious Transfer and Its Variants
, 386-412,
Vladimir Kolesnikov
,
Ranjit Kumaresan
bib info -
Public Verifiability in the Covert Model (Almost) for Free
, 210-235,
Vladimir Kolesnikov
,
Alex J. Malozemoff
bib info -
Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and Marble
, 510-532,
Thomas Fuhr
,
Valentin Suder
,
Gaëtan Leurent
bib info -
Function-Hiding Inner Product Encryption
, 470-491,
Abhishek Jain
,
Allison Bishop
,
Lucas Kowalczyk
bib info -
Multi-input Functional Encryption for Unbounded Arity Functions
, 27-51,
Amit Sahai
,
Divya Gupta
,
Abhishek Jain
,
Saikrishna Badrinarayanan
bib info -
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
, 575-601,
Nuttapong Attrapadung
,
Goichiro Hanaoka
,
Shota Yamada
bib info -
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
, 103-120,
Michel Abdalla
,
Fabrice Benhamouda
,
Alain Passelègue
bib info -
A Framework for Identity-Based Encryption with Almost Tight Security
, 521-549,
Nuttapong Attrapadung
,
Goichiro Hanaoka
,
Shota Yamada
bib info -
Garbling Scheme for Formulas with Constant Size of Garbled Gates
, 758-782,
Koutarou Suzuki
,
Susumu Kiyoshima
,
Ryo Kikuchi
,
Carmen Kempka
bib info -
Limits of Extractability Assumptions with Distributional Auxiliary Input
, 236-261,
Rafael Pass
,
Elette Boyle
bib info -
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
, 52-75,
Amit Sahai
,
Vanishree Rao
,
Dakshita Khurana
bib info -
Card-Based Cryptographic Protocols Using a Minimal Number of Cards
, 783-807,
Alexander Koch
,
Stefan Walzer
,
Kevin Härtel
bib info -
Three-Party ORAM for Secure Computation
, 360-385,
Stanislaw Jarecki
,
Sky Faber
,
Sotirios Kentros
,
Boyang Wei
bib info -
Pure Differential Privacy for Rectangle Queries via Private Partitions
, 735-751,
Moni Naor
,
Cynthia Dwork
,
Omer Reingold
,
Guy N. Rothblum
bib info - Invited Talk: Structure-Preserving Cryptography , Masayuki Abe
- Invited Talk: Computer-aided cryptography: status and perspectives , Gilles Barthe
- Invited Talk: The Moral Character of Cryptographic Work , Phillip Rogaway