Skip to main content
  • Conference proceedings
  • © 2011

Advances in Cryptology -- ASIACRYPT 2011

17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011, Proceedings

  • Up-to-date results
  • Fast-track conference proceedings
  • State-of-the-art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7073)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (40 papers)

  1. Front Matter

  2. Lattices and Quantum Cryptography

    1. BKZ 2.0: Better Lattice Security Estimates

      • Yuanmi Chen, Phong Q. Nguyen
      Pages 1-20
    2. Functional Encryption for Inner Product Predicates from Learning with Errors

      • Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
      Pages 21-40
    3. Random Oracles in a Quantum World

      • Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
      Pages 41-69
  3. Public Key Encryption I

    1. Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security

      • Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud
      Pages 70-88
    2. Structure Preserving CCA Secure Encryption and Applications

      • Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens
      Pages 89-106
    3. Decoding Random Linear Codes in \(\tilde{\mathcal{O}}(2^{0.054n})\)

      • Alexander May, Alexander Meurer, Enrico Thomae
      Pages 107-124
    4. Lower and Upper Bounds for Deniable Public-Key Encryption

      • Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
      Pages 125-142
  4. Public Key Encryption II

    1. Bridging Broadcast Encryption and Group Key Agreement

      • Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farràs
      Pages 143-160
    2. On the Joint Security of Encryption and Signature, Revisited

      • Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson
      Pages 161-178
    3. Polly Cracker, Revisited

      • Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret
      Pages 179-196
  5. Database Privacy

    1. Oblivious RAM with O((logN)3) Worst-Case Cost

      • Elaine Shi, T. -H. Hubert Chan, Emil Stefanov, Mingfei Li
      Pages 197-214
    2. Noiseless Database Privacy

      • Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta
      Pages 215-232
  6. Hash Function

    1. The Preimage Security of Double-Block-Length Compression Functions

      • Frederik Armknecht, Ewan Fleischmann, Matthias Krause, Jooyoung Lee, Martijn Stam, John Steinberger
      Pages 233-251
    2. Rebound Attack on JH42

      • María Naya-Plasencia, Deniz Toz, Kerem Varici
      Pages 252-269
    3. Second-Order Differential Collisions for Reduced SHA-256

      • Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolić
      Pages 270-287
    4. Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions

      • Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 288-307
  7. Symmetric Key Encryption

    1. Cryptanalysis of ARMADILLO2

      • Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner
      Pages 308-326
    2. An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware

      • Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
      Pages 327-343
    3. Biclique Cryptanalysis of the Full AES

      • Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
      Pages 344-371

Other Volumes

  1. Advances in Cryptology – ASIACRYPT 2011

About this book

This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.

Editors and Affiliations

  • Center for Information Security Technologies, Korea University, Seoul, South Korea

    Dong Hoon Lee

  • Shandong University, China

    Xiaoyun Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access