Skip to main content
  • Conference proceedings
  • © 2019

Advances in Cryptology – ASIACRYPT 2019

25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11923)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2019.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

    Pages i-xv
  2. Signatures

    1. Front Matter

      Pages 1-1
    2. Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures

      • Yilei Chen, Nicholas Genise, Pratyay Mukherjee
      Pages 3-32
    3. Decisional Second-Preimage Resistance: When Does SPR Imply PRE?

      • Daniel J. Bernstein, Andreas Hülsing
      Pages 33-62
    4. Structure-Preserving Signatures on Equivalence Classes from Standard Assumptions

      • Mojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian
      Pages 63-93
  3. Public Key Encryption (1)

    1. Front Matter

      Pages 95-95
    2. Simple and Efficient KDM-CCA Secure Public Key Encryption

      • Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
      Pages 97-127
    3. Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem

      • Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka
      Pages 128-158
    4. Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications

      • Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols
      Pages 159-190
    5. iUC: Flexible Universal Composability Made Simple

      • Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch
      Pages 191-221
  4. Side Channels

    1. Front Matter

      Pages 223-223
    2. Leakage Resilience of the Duplex Construction

      • Christoph Dobraunig, Bart Mennink
      Pages 225-255
    3. Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages

      • Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos et al.
      Pages 285-314
    4. Simple Refreshing in the Noisy Leakage Model

      • Stefan Dziembowski, Sebastian Faust, Karol Żebrowski
      Pages 315-344
  5. Symmetric Cryptography (2)

    1. Front Matter

      Pages 345-345
    2. Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

      • Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger et al.
      Pages 371-397
    3. MILP-aided Method of Searching Division Property Using Three Subsets and Applications

      • Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
      Pages 398-427

About this book

The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019.

The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.

Editors and Affiliations

  • University of Auckland, Auckland, New Zealand

    Steven D. Galbraith

  • Security Fundamentals Lab, NICT, Tokyo, Japan

    Shiho Moriai

Bibliographic Information

  • Book Title: Advances in Cryptology – ASIACRYPT 2019

  • Book Subtitle: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III

  • Editors: Steven D. Galbraith, Shiho Moriai

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-030-34618-8

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: International Association for Cryptologic Research 2019

  • Softcover ISBN: 978-3-030-34617-1Published: 12 November 2019

  • eBook ISBN: 978-3-030-34618-8Published: 22 November 2019

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XV, 761

  • Number of Illustrations: 1309 b/w illustrations, 23 illustrations in colour

  • Topics: Cryptology, Computer Communication Networks, Coding and Information Theory, Computing Milieux, Mathematics of Computing

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access