ASIACRYPT 2009:
Mitsuru Matsui (Eds.):
Advances in Cryptology - ASIACRYPT 2009 - ASIACRYPT 2009,
15th International Conference on the Theory and Application of Cryptology and Information Security,
Tokyo, Japan,
December 6-10, 2009
Proceedings.
ASIACRYPT 2009
Tokyo, Japan,
December 6-10, 2009
Organizational Committee
Program Chairs : | Mitsuru Matsui | |
General Chair : | Eiji Okamoto |
Program Committee
Masayuki Abe
Josh Cohen Benaloh Daniel J. Bernstein Xavier Boyen Claude Carlet Kim-Kwang Raymond Choo Claus Diem Stefan Dziembowski Serge Fehr Jun Furukawa Henri Gilbert Jens Groth Shai Halevi Goichiro Hanaoka Helena Handschuh Tetsu Iwata Thomas Johansson Marc Joye Lars R. Knudsen |
Xuejia Lai
Dong Hoon Lee Arjen K. Lenstra Keith M. Martin Phong Q. Nguyen Kaisa Nyberg Elisabeth Oswald Pascal Paillier Josef Pieprzyk David Pointcheval Manoj Prabhakaran Bart Preneel Vincent Rijmen Phillip Rogaway Reihaneh Safavi-Naini Berry Schoenmakers François-Xavier Standaert Serge Vaudenay Ivan Visconti |
External Referees
Block Ciphers
-
Related-Key Cryptanalysis of the Full AES-192 and AES-256.
, 1-18,
Alex Biryukov
,
Dmitry Khovratovich
bib info -
The Key-Dependent Attack on Block Ciphers.
, 19-36,
Xuejia Lai
,
Xiaorui Sun
bib info -
Cascade Encryption Revisited.
, 37-51,
Ueli M. Maurer
,
Peter Gazi
bib info
Quantum and Post-Quantum
-
Quantum-Secure Coin-Flipping and Applications.
, 52-69,
Ivan Damgård
,
Carolin Lunemann
bib info -
Security Bounds for the Design of Code-Based Cryptosystems.
, 88-105,
Matthieu Finiasz
,
Nicolas Sendrier
bib info
Hash Functions I
-
Rebound Attack on the Full Lane Compression Function.
, 106-125,
Yu Sasaki
,
Martin Schläffer
,
Krystian Matusiewicz
,
María Naya-Plasencia
,
Ivica Nikolic
bib info -
Rebound Distinguishers: Results on the Full Whirlpool Compression Function.
, 126-143,
Vincent Rijmen
,
Christian Rechberger
,
Florian Mendel
,
Martin Schläffer
,
Mario Lamberger
bib info -
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners.
, 144-161,
Christian Rechberger
,
Florian Mendel
,
Martin Schläffer
bib info -
The Intel AES Instructions Set and the SHA-3 Candidates.
, 162-178,
Olivier Billet
,
Matthew J. B. Robshaw
,
Shay Gueron
,
Ryad Benadjila
bib info
Encryption Schemes
-
Group Encryption: Non-interactive Realization in the Standard Model.
, 179-196,
Benoît Libert
,
Moti Yung
,
Julien Cathalo
bib info -
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations.
, 197-213,
Jonathan Katz
,
Arkady Yerukhimovich
bib info -
Hierarchical Predicate Encryption for Inner-Products.
, 214-231,
Tatsuaki Okamoto
,
Katsuyuki Takashima
bib info -
Hedged Public-Key Encryption: How to Protect against Bad Randomness.
, 232-249,
Mihir Bellare
,
Thomas Ristenpart
,
Hovav Shacham
,
Moni Naor
,
Gil Segev
,
Scott Yilek
,
Zvika Brakerski
bib info
Multi Party Computation
-
Secure Two-Party Computation Is Practical.
, 250-267,
Benny Pinkas
,
Nigel P. Smart
,
Thomas Schneider
,
Stephen C. Williams
bib info -
Secure Multi-party Computation Minimizing Online Rounds.
, 268-286,
Moti Yung
,
Seung Geol Choi
,
Ariel Elbaz
,
Tal Malkin
bib info -
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols.
, 287-302,
Seung Geol Choi
,
Tal Malkin
,
Hoeteck Wee
,
Dana Dachman-Soled
bib info
Cryptographic Protocols
-
Non-malleable Statistically Hiding Commitment from Any One-Way Function.
, 303-318,
Zhenfu Cao
,
Ning Ding
,
Zongyang Zhang
,
Rong Ma
bib info -
Proofs of Storage from Homomorphic Identification Protocols.
, 319-333,
Giuseppe Ateniese
,
Jonathan Katz
,
Seny Kamara
bib info -
Simple Adaptive Oblivious Transfer without Random Oracle.
, 334-346,
Kaoru Kurosawa
,
Ryo Nojima
bib info
Hash Functions II
-
Improved Generic Algorithms for 3-Collisions.
, 347-363,
Antoine Joux
,
Stefan Lucks
bib info -
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical.
, 364-381,
Anja Lehmann
,
Stefano Tessaro
bib info
Models and Frameworks I
-
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
, 399-416,
Jörg Schwenk
,
Tibor Jager
bib info -
Zero Knowledge in the Random Oracle Model, Revisited.
, 417-434,
Hoeteck Wee
bib info -
A Framework for Universally Composable Non-committing Blind Signatures.
, 435-450,
Masayuki Abe
,
Miyako Ohkubo
bib info
Cryptanalysis: Sqaure and Quadratic
-
Cryptanalysis of the Square Cryptosystems.
, 451-468,
Olivier Billet
,
Gilles Macario-Rat
bib info -
Factoring
pq
2
with Quadratic Forms: Nice Cryptanalyses.
, 469-486,
Phong Q. Nguyen
,
Antoine Joux
,
Fabien Laguillaumie
,
Guilhem Castagnos
bib info -
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
, 487-504,
Alexander May
,
Mathias Herrmann
bib info
Models and Frameworks II
-
Security Notions and Generic Constructions for Client Puzzles.
, 505-523,
Liqun Chen
,
Nigel P. Smart
,
Bogdan Warinschi
,
Paul Morrissey
bib info -
Foundations of Non-malleable Hash and One-Way Functions.
, 524-541,
Alexandra Boldyreva
,
Marc Fischlin
,
Bogdan Warinschi
,
David Cash
bib info
Hash Functions III
-
Improved Cryptanalysis of Skein.
, 542-559,
Willi Meier
,
Jean-Philippe Aumasson
,
Raphael C.-W. Phan
,
Çagdas Çalik
,
Onur Özen
,
Kerem Varici
bib info -
Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
, 560-577,
Willi Meier
,
Thomas Peyrin
,
Eric Brier
,
Shahram Khazaei
bib info -
Preimages for Step-Reduced SHA-2.
, 578-597,
Kazumaro Aoki
,
Yu Sasaki
,
Krystian Matusiewicz
,
Lei Wang
,
Jian Guo
bib info
Lattice-Based
-
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures.
, 598-616,
Vadim Lyubashevsky
bib info -
Efficient Public Key Encryption Based on Ideal Lattices.
, 617-635,
Keisuke Tanaka
,
Ron Steinfeld
,
Damien Stehlé
,
Keita Xagawa
bib info -
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices.
, 636-652,
Jonathan Katz
,
Vinod Vaikuntanathan
bib info
Side Channels
-
PSS Is Secure against Random Fault Attacks.
, 653-666,
Jean-Sébastien Coron
,
Avradip Mandal
bib info -
Cache-Timing Template Attacks.
, 667-684,
Billy Bob Brumley
,
Risto M. Hakala
bib info -
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
, 685-702,
Ahmad-Reza Sadeghi
,
Pim Tuyls
,
Berk Sunar
,
Frederik Armknecht
,
Roel Maes
bib info -
Signature Schemes with Bounded Leakage Resilience.
, 703-720,
Jonathan Katz
,
Vinod Vaikuntanathan
bib info
Author Index