Skip to main content
  • Conference proceedings
  • © 2010

Advances in Cryptology - ASIACRYPT 2010

16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

Editors:

  • unique visibility, state-of-the-art research,
  • fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6477)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

  2. Hash Attacks

    1. Rotational Rebound Attacks on Reduced Skein

      • Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger
      Pages 1-19
    2. Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl

      • Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta
      Pages 38-55
  3. Symmetric-Key Cryptosystems

    1. Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions

      • Emmanuel Volte, Valérie Nachef, Jacques Patarin
      Pages 94-111
    2. The World Is Not Enough: Another Look on Second-Order DPA

      • François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper et al.
      Pages 112-129
  4. Block and Stream Ciphers

    1. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems

      • Simon Knellwolf, Willi Meier, María Naya-Plasencia
      Pages 130-145
    2. A Byte-Based Guess and Determine Attack on SOSEMANUK

      • Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, Dengguo Feng
      Pages 146-157
    3. Improved Single-Key Attacks on 8-Round AES-192 and AES-256

      • Orr Dunkelman, Nathan Keller, Adi Shamir
      Pages 158-176
  5. Protocols

    1. Constant-Size Commitments to Polynomials and Their Applications

      • Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
      Pages 177-194
    2. Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model

      • Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
      Pages 213-231
  6. Key Exchange

    1. Generic Compilers for Authenticated Key Exchange

      • Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
      Pages 232-249
    2. A Forward-Secure Symmetric-Key Derivation Protocol

      • Eric Brier, Thomas Peyrin
      Pages 250-267
  7. Foundation

    1. Efficient String-Commitment from Weak Bit-Commitment

      • Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang
      Pages 268-282
    2. Random Oracles with(out) Programmability

      • Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro
      Pages 303-320
  8. Zero-Knowledge

Other Volumes

  1. Advances in Cryptology - ASIACRYPT 2010

Editors and Affiliations

  •  , Tokyo, Japan

    Masayuki Abe

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access