×

zbMATH — the first resource for mathematics

Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. (English) Zbl 1155.94008
Lecture Notes in Computer Science 5350. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). xiv, 572 p. (2008).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1135.94001).
Indexed articles:
Hirt, Martin; Maurer, Ueli; Zikas, Vassilis, MPC vs. SFE: unconditional and computational security, 1-18 [Zbl 1206.94073]
Zhang, Zhifang; Liu, Mulan; Chee, Yeow Meng; Ling, San; Wang, Huaxiong, Strongly multiplicative and 3-multiplicative linear secret sharing schemes, 19-36 [Zbl 1172.94607]
Sun, Xiaoming; Yao, Andrew Chi-Chih; Tartary, Christophe, Graph design for secure multiparty computation over non-abelian groups, 37-53 [Zbl 1206.94093]
Yao, Andrew Chi-Chih, Some perspectives on complexity-based cryptography, 54 [Zbl 1206.94099]
Morrissey, P.; Smart, N. P.; Warinschi, B., A modular security analysis of the TLS handshake protocol, 55-73 [Zbl 1206.94082]
Huang, Qiong; Yang, Guomin; Wong, Duncan S.; Susilo, Willy, Ambiguous optimistic fair exchange, 74-89 [Zbl 1206.94075]
Shacham, Hovav; Waters, Brent, Compact proofs of retrievability, 90-107 [Zbl 1206.68110]
Ouafi, Khaled; Overbeck, Raphael; Vaudenay, Serge, On the security of HB\(^{\#}\) against a man-in-the-middle attack, 108-124 [Zbl 1206.94084]
Bellare, Mihir; Ristov, Todor, Hash functions from sigma protocols and improvements to VSH, 125-142 [Zbl 1206.94053]
Gorski, Michael; Lucks, Stefan; Peyrin, Thomas, Slide attacks on a class of hash functions, 143-160 [Zbl 1206.94067]
Maurer, Ueli; Tessaro, Stefano, Basing PRFs on constant-query weak PRFs: minimizing assumptions for efficient symmetric cryptography, 161-178 [Zbl 1206.94081]
Green, Matthew; Hohenberger, Susan, Universally composable adaptive oblivious transfer, 179-197 [Zbl 1206.94068]
Keller, Jason; Kilian, Joe, A linked-list approach to cryptographically secure elections using instant runoff voting, 198-215 [Zbl 1206.94077]
Prabhakaran, Manoj; Rosulek, Mike, Towards robust computation on encrypted data, 216-233 [Zbl 1206.68111]
Camenisch, Jan; Chaabouni, Rafik; Shelat, Abhi, Efficient protocols for set membership and range proofs, 234-252 [Zbl 1206.94057]
Sasaki, Yu; Aoki, Kazumaro, Preimage attacks on 3, 4, and 5-pass HAVAL, 253-271 [Zbl 1206.94089]
Yasuda, Kan, How to fill up Merkle-Damgård hash functions, 272-289 [Zbl 1206.94100]
Backes, Michael; Unruh, Dominique, Limits of constructive security proofs, 290-307 [Zbl 1206.94051]
Hanaoka, Goichiro; Kurosawa, Kaoru, Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption, 308-325 [Zbl 1206.94070]
Hisil, Huseyin; Wong, Kenneth Koon-Ho; Carter, Gary; Dawson, Ed, Twisted Edwards curves revisited, 326-343 [Zbl 1206.94074]
Schridde, Christian; Freisleben, Bernd, On the validity of the \(\Phi \)-Hiding assumption in cryptographic protocols, 344-354 [Zbl 1206.94091]
Abe, Masayuki; Kiltz, Eike; Okamoto, Tatsuaki, Chosen ciphertext security with optimal ciphertext overhead, 355-371 [Zbl 1206.94047]
Kawachi, Akinori; Tanaka, Keisuke; Xagawa, Keita, Concurrently secure identification schemes based on the worst-case hardness of lattice problems, 372-389 [Zbl 1206.94076]
Pujol, Xavier; Stehlé, Damien, Rigorous and efficient short lattice vectors enumeration, 390-405 [Zbl 1206.94086]
Herrmann, Mathias; May, Alexander, Solving linear equations modulo divisors: on factoring given any bits, 406-424 [Zbl 1206.94072]
Carlet, Claude; Feng, Keqin, An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity, 425-440 [Zbl 1206.94060]
Dunkelman, Orr; Keller, Nathan, An improved impossible differential attack on MISTY1, 441-454 [Zbl 1206.94064]
Boneh, Dan; Hamburg, Michael, Generalized identity based and broadcast encryption schemes, 455-470 [Zbl 1206.94054]
Cheon, Jung Hee; Hong, Jin; Kim, Minkyu, Speeding up the Pollard rho method on prime fields, 471-488 [Zbl 1206.94061]
Rupp, Andy; Leander, Gregor; Bangerter, Endre; Dent, Alexander W.; Sadeghi, Ahmad-Reza, Sufficient conditions for intractability over black-box groups: generic lower bounds for generalized DL and DH problems, 489-505 [Zbl 1184.94244]
Backes, Michael; Dürmuth, Markus; Unruh, Dominique, OAEP is secure under key-dependent messages, 506-523 [Zbl 1206.94050]
Lee, Jung-Keun; Lee, Dong Hoon; Park, Sangwoo, Cryptanalysis of Sosemanuk and SNOW 2.0 using linear masks, 524-538 [Zbl 1206.94078]
Dunkelman, Orr; Keller, Nathan, A new attack on the LEX stream cipher, 539-556 [Zbl 1206.94065]
Hell, Martin; Johansson, Thomas, Breaking the F-FCSR-H stream cipher in real time, 557-569 [Zbl 1206.94071]

MSC:
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Software:
LEX
PDF BibTeX XML Cite
Full Text: DOI