Skip to main content
  • Conference proceedings
  • © 2018

Advances in Cryptology – ASIACRYPT 2018

24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11273)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

    Pages I-XVII
  2. Symmetric-Key Cryptanalysis

    1. Front Matter

      Pages 1-1
    2. Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints

      • Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu
      Pages 3-34
    3. Cryptanalysis of MORUS

      • Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella et al.
      Pages 35-64
    4. New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions

      • Ling Song, Jian Guo, Danping Shi, San Ling
      Pages 65-95
    5. On the Concrete Security of Goldreich’s Pseudorandom Generator

      • Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
      Pages 96-124
  3. Public Key and Identity-Based Encryption

    1. Front Matter

      Pages 125-125
    2. A Framework for Achieving KDM-CCA Secure Public-Key Encryption

      • Fuyuki Kitagawa, Keisuke Tanaka
      Pages 127-157
    3. Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism

      • Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He
      Pages 158-189
    4. Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks

      • Dennis Hofheinz, Dingding Jia, Jiaxin Pan
      Pages 190-220
  4. Asiacrypt 2018 Award Paper I

    1. Front Matter

      Pages 251-251
    2. Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model

      • Shuichi Katsumata, Shota Yamada, Takashi Yamakawa
      Pages 253-282
  5. Side-Channels

    1. Front Matter

      Pages 283-283
    2. New Instantiations of the CRYPTO 2017 Masking Schemes

      • Pierre Karpman, Daniel S. Roche
      Pages 285-314
    3. Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures

      • Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas
      Pages 315-342
    4. Tight Private Circuits: Achieving Probing Security with the Least Refreshing

      • Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain
      Pages 343-372
    5. Attacks and Countermeasures for White-box Designs

      • Alex Biryukov, Aleksei Udovenko
      Pages 373-402
  6. Signatures

    1. Front Matter

      Pages 403-403
    2. Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys

      • Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
      Pages 405-434

About this book

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.

The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Editors and Affiliations

  • Nanyang Technological University, Singapore, Singapore

    Thomas Peyrin

  • University of Auckland, Auckland, New Zealand

    Steven Galbraith

Bibliographic Information

  • Book Title: Advances in Cryptology – ASIACRYPT 2018

  • Book Subtitle: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II

  • Editors: Thomas Peyrin, Steven Galbraith

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-030-03329-3

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: International Association for Cryptologic Research 2018

  • Softcover ISBN: 978-3-030-03328-6Published: 27 October 2018

  • eBook ISBN: 978-3-030-03329-3Published: 22 November 2018

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XVII, 767

  • Number of Illustrations: 133 b/w illustrations, 50 illustrations in colour

  • Topics: Cryptology, Software Engineering/Programming and Operating Systems, Computer Communication Networks, Artificial Intelligence

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access