ASIACRYPT 2012:
Xiaoyun Wang and Kazue Sako (Eds.):
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security,
Beijing, China,
December 2-6, 2012
Proceedings.
ASIACRYPT 2012
Beijing, China,
December 2-6, 2012
Organizational Committee
Program Chairs: | Xiaoyun Wang and Kazue Sako |
Organized in cooperation with Chinese Association for Cryptologic Research (CACR)
Sponsoring Institutions:
National Natural Science Foundation of China
Huawei Technologies Co. Ltd.
Intel Corporation
Program Committee
Feng Bao |
Alex Biryukov |
Xavier Boyen |
David Cash |
Jung Hee Cheon |
Sherman S. M. Chow |
Joan Daemen |
Orr Dunkelman |
Marc Fischlin |
Vipul Goyal |
Tetsu Iwata |
Antoine Joux |
Jonathan Katz |
Eike Kiltz |
Lars R. Knudsen |
Dong Hoon Lee |
Arjen K. Lenstra |
Dongdai Lin |
Mitsuru Matsui |
Willi Meier |
Florian Mendel |
Phong Q. Nguyen |
Tatsuaki Okamoto |
Kenny Paterson |
Bart Preneel |
Christian Rechberger |
Reihaneh Safavi-Naini |
Nigel P. Smart |
Ron Steinfeld |
Hongjun Wu |
External Referees
- Invited Talks
-
Public-key Cryptography I
-
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
, 4-24,
Masayuki Abe
,
Miyako Ohkubo
,
Melissa Chase
,
Markulf Kohlweiss
,
Ryo Nishimaki
,
Bernardo David
bib info -
Dual Form Signatures: An Approach for Proving Security from Static Assumptions
, 25-42,
Brent Waters
,
Adam O'Neill
,
Allison B. Lewko
,
Michael Gerbush
bib info -
Breaking Pairing-Based Cryptosystems Using η
T
Pairing over GF(397)
, 43-60,
Tsuyoshi Takagi
,
Takeshi Shimoyama
,
Takuya Hayashi
,
Naoyuki Shinohara
bib info
-
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
, 4-24,
Masayuki Abe
,
Miyako Ohkubo
,
Melissa Chase
,
Markulf Kohlweiss
,
Ryo Nishimaki
,
Bernardo David
-
Foundation
-
On the (Im)possibility of Projecting Property in Prime-Order Setting
, 61-79,
Jae Hong Seo
bib info -
Optimal Reductions of Some Decisional Problems to the Rank Problem
, 80-97,
Jorge Luis Villar
bib info -
Signature Schemes Secure against Hard-to-Invert Leakage
, 98-115,
Jesper Buus Nielsen
,
Carmit Hazay
,
Sebastian Faust
,
Peter Sebastian Nordholt
,
Angela Zottarel
bib info -
Completeness for Symmetric Two-Party Functionalities - Revisited
, 116-133,
Yehuda Lindell
,
Eran Omri
,
Hila Zarosim
bib info -
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
, 134-153,
Mihir Bellare
,
Phillip Rogaway
,
Viet Tung Hoang
bib info -
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions
, 154-171,
Rosario Gennaro
,
Muthuramakrishnan Venkitasubramaniam
,
Scott Ames
bib info
-
On the (Im)possibility of Projecting Property in Prime-Order Setting
, 61-79,
Jae Hong Seo
-
Symmetric Cipher
-
Perfect Algebraic Immune Functions
, 172-189,
Dongdai Lin
,
Meicheng Liu
,
Yin Zhang
bib info -
Differential Analysis of the LED Block Cipher
, 190-207,
Vincent Rijmen
,
Florian Mendel
,
Kerem Varici
,
Deniz Toz
bib info -
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract
, 208-225,
Christian Rechberger
,
Anne Canteaut
,
Lars R. Knudsen
,
Gregor Leander
,
Ventzislav Nikov
,
Christof Paar
,
Julia Borghoff
,
Miroslav Knezevic
,
Tim Güneysu
,
Elif Bilge Kavun
,
Peter Rombouts
,
Søren S. Thompsen,
Tolga Yalçin
bib info -
Analysis of Differential Attacks in ARX Constructions
, 226-243,
Gaëtan Leurent
bib info -
Integral and Multidimensional Linear Distinguishers with Correlation Zero
, 244-261,
Gregor Leander
,
Kaisa Nyberg
,
Andrey Bogdanov
,
Meiqin Wang
bib info -
Differential Attacks against Stream Cipher ZUC
, 262-277,
Huaxiong Wang
,
Hongjun Wu
,
San Ling
,
Tao Huang
,
Phuong Ha Nguyen
bib info
-
Perfect Algebraic Immune Functions
, 172-189,
Dongdai Lin
,
Meicheng Liu
,
Yin Zhang
-
Security Proof
-
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
, 278-295,
Jacques Patarin
,
Yannick Seurin
,
Rodolphe Lampe
bib info -
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
, 296-312,
Peng Wang
,
Wenling Wu
,
Liting Zhang
,
Han Sui
bib info -
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
, 331-348,
Mihir Bellare
,
Kenneth G. Paterson
,
Susan Thomson
bib info
-
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
, 278-295,
Jacques Patarin
,
Yannick Seurin
,
Rodolphe Lampe
-
Public-key Cryptography II
-
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
, 349-366,
Tatsuaki Okamoto
,
Katsuyuki Takashima
bib info -
Computing on Authenticated Data: New Privacy Definitions and Constructions
, 367-385,
Nuttapong Attrapadung
,
Benoît Libert
,
Thomas Peters
bib info -
A Coding-Theoretic Approach to Recovering Noisy RSA Keys
, 386-403,
Kenneth G. Paterson
,
Antigoni Polychroniadou
,
Dale L. Sibborn
bib info -
Certifying RSA
, 404-414,
Eike Kiltz
,
Alexander May
,
Saqib A. Kakvi
bib info
-
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
, 349-366,
Tatsuaki Okamoto
,
Katsuyuki Takashima
-
Lattice-based cryptography and Number theory
-
Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic
, 415-432,
Phong Q. Nguyen
,
Léo Ducas
bib info -
Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures
, 433-450,
Phong Q. Nguyen
,
Léo Ducas
bib info -
On Polynomial Systems Arising from a Weil Descent
, 451-466,
Jean-Jacques Quisquater
,
Christophe Petit
bib info
-
Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic
, 415-432,
Phong Q. Nguyen
,
Léo Ducas
- Public-key Cryptography III
-
Hash Function
-
Provable Security of the Knudsen-Preneel Compression Functions
, 504-525,
Jooyoung Lee
bib info -
Optimal Collision Security in Double Block Length Hashing with Single Length Key
, 526-543,
Bart Mennink
bib info -
Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings
, 544-561,
Dmitry Khovratovich
bib info -
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
, 562-579,
Yu Sasaki
,
Lei Wang
,
Wenling Wu
,
Shuang Wu
bib info -
Generic Related-Key Attacks for HMAC
, 580-597,
Thomas Peyrin
,
Yu Sasaki
,
Lei Wang
bib info
-
Provable Security of the Knudsen-Preneel Compression Functions
, 504-525,
Jooyoung Lee
-
Cryptographic Protocol I
-
The Five-Card Trick Can Be Done with Four Cards
, 598-606,
Takaaki Mizuki
,
Michihito Kumamoto
,
Hideaki Sone
bib info -
A Mix-Net from Any CCA2 Secure Cryptosystem
, 607-625,
Tal Moran
,
Shahram Khazaei
,
Douglas Wikström
bib info -
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
, 626-643,
Bogdan Warinschi
,
Olivier Pereira
,
David Bernhard
bib info
-
The Five-Card Trick Can Be Done with Four Cards
, 598-606,
Takaaki Mizuki
,
Michihito Kumamoto
,
Hideaki Sone
-
Cryptographic Protocol II
-
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract)
, 644-662,
Leonid Reyzin
,
Sharon Goldberg
,
Kyle Brogle
bib info -
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
, 663-680,
Krzysztof Pietrzak
,
Stephan Krenn
,
Abhishek Jain
,
Aris Tentes
bib info -
Calling Out Cheaters: Covert Security with Public Verifiability
, 681-698,
Claudio Orlandi
,
Gilad Asharov
bib info -
A Unified Framework for UC from Only OT
, 699-717,
Rafael Pass
,
Muthuramakrishnan Venkitasubramaniam
,
Huijia Lin
bib info
-
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract)
, 644-662,
Leonid Reyzin
,
Sharon Goldberg
,
Kyle Brogle
-
Implementation Issues
-
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
, 718-739,
Francesco Sica
,
Patrick Longa
bib info -
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
, 740-757,
François-Xavier Standaert
,
Marcel Medwed
,
Nicolas Veyrat-Charvillon
,
Stéphanie Kerckhof
bib info -
Theory and Practice of a Leakage Resilient Masking Scheme
, 758-775,
Ingrid Verbauwhede
,
Benedikt Gierlichs
,
Sebastian Faust
,
Josep Balasch
bib info
-
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
, 718-739,
Francesco Sica
,
Patrick Longa