Security and Cryptology

Advances in Cryptology -- ASIACRYPT 2014

20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I

Editors: Sarkar, Palash, Iwata, Tetsu (Eds.)

Free Preview

Buy this book

eBook $79.99
price for USA in USD (gross)
  • ISBN 978-3-662-45611-8
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.99
price for USA in USD
  • ISBN 978-3-662-45610-1
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Table of contents (29 chapters)

  • Solving LPN Using Covering Codes

    Guo, Qian (et al.)

    Pages 1-20

  • Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form

    Faugère, Jean-Charles (et al.)

    Pages 21-41

  • Bivariate Polynomials Modulo Composites and Their Applications

    Boneh, Dan (et al.)

    Pages 42-62

  • Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)

    Biryukov, Alex (et al.)

    Pages 63-84

  • Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes

    Jovanovic, Philipp (et al.)

    Pages 85-104

Buy this book

eBook $79.99
price for USA in USD (gross)
  • ISBN 978-3-662-45611-8
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.99
price for USA in USD
  • ISBN 978-3-662-45610-1
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Advances in Cryptology -- ASIACRYPT 2014
Book Subtitle
20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
Editors
  • Palash Sarkar
  • Tetsu Iwata
Series Title
Security and Cryptology
Series Volume
8873
Copyright
2014
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
International Association for Cryptologic Research
eBook ISBN
978-3-662-45611-8
DOI
10.1007/978-3-662-45611-8
Softcover ISBN
978-3-662-45610-1
Edition Number
1
Number of Pages
XX, 574
Number of Illustrations
74 b/w illustrations
Topics