×

Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. (English) Zbl 1402.94008

Lecture Notes in Computer Science 11272. Cham: Springer (ISBN 978-3-030-03325-5/pbk; 978-3-030-03326-2/ebook). xxiv, 659 p. (2018).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1380.94007; Zbl 1380.94008; Zbl 1380.94009]. For Parts II and III of the proceedings of the present conference see [Zbl 1402.94009; Zbl 1402.94010].
Indexed articles:
Beyne, Tim, Block cipher invariants as eigenvectors of correlation matrices, 3-31 [Zbl 1446.94102]
Beullens, Ward; Blackburn, Simon R., Practical attacks against the walnut digital signature scheme, 35-61 [Zbl 1446.94101]
Debris-Alazard, Thomas; Tillich, Jean-Pierre, Two attacks on rank metric code-based schemes: RankSign and an IBE scheme, 62-92 [Zbl 1446.94124]
Barelli, Élise; Couvreur, Alain, An efficient structural attack on NIST submission DAGS, 93-118 [Zbl 1446.94098]
Desmoulins, Nicolas; Fouque, Pierre-Alain; Onete, Cristina; Sanders, Olivier, Pattern matching on encrypted streams, 121-148 [Zbl 1446.94125]
Kamara, Seny; Moataz, Tarik, SQL on structurally-encrypted databases, 149-180 [Zbl 1440.68057]
Cash, David; Liu, Feng-Hao; O’Neill, Adam; Zhandry, Mark; Zhang, Cong, Parameter-hiding order revealing encryption, 181-210 [Zbl 1440.68055]
Guo, Chun; Wang, Lei, Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security, 213-243 [Zbl 1446.94133]
Chen, Yu Long; Mennink, Bart; Nandi, Mridul, Short variable length domain extenders with beyond birthday bound security, 244-274 [Zbl 1446.94116]
Hosoyamada, Akinori; Yasuda, Kan, Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions, 275-304 [Zbl 1446.94139]
Lee, ByeongHak; Lee, Jooyoung, Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model, 305-335 [Zbl 1446.94148]
Bhaumik, Ritam; List, Eik; Nandi, Mridul, ZCZ – achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls, 336-366 [Zbl 1446.94103]
Bai, Shi; Stehlé, Damien; Wen, Weiqiang, Measuring, simulating and exploiting the head concavity phenomenon in BKZ, 369-404 [Zbl 1446.94097]
Aono, Yoshinori; Nguyen, Phong Q.; Shen, Yixin, Quantum lattice enumeration and tweaking discrete pruning, 405-434 [Zbl 1446.94094]
Chen, Long; Zhang, Zhenfeng; Zhang, Zhenfei, On the hardness of the computational ring-LWR problem and its applications, 435-464 [Zbl 1446.94115]
Ducas, Léo; Pellet-Mary, Alice, On the statistical leak of the GGH13 multilinear map and some variants, 465-493 [Zbl 1446.94129]
Bootle, Jonathan; Delaplace, Claire; Espitau, Thomas; Fouque, Pierre-Alain; Tibouchi, Mehdi, LWE without modular reduction and improved side-channel attacks against BLISS, 494-524 [Zbl 1446.94109]
Grassi, Lorenzo; Naya-Plasencia, María; Schrottenloher, André, Quantum algorithms for the \(k\)-XOR problem, 527-559 [Zbl 1446.94132]
Bonnetain, Xavier; Naya-Plasencia, María, Hidden shift quantum cryptanalysis and implications, 560-592 [Zbl 1446.94106]
Bootle, Jonathan; Cerulli, Andrea; Groth, Jens; Jakobsen, Sune; Maller, Mary, Arya: nearly linear-time zero-knowledge proofs for correct program execution, 595-626 [Zbl 1446.94108]
Abe, Masayuki; Jutla, Charanjit S.; Ohkubo, Miyako; Roy, Arnab, Improved (almost) tightly-secure simulation-sound QA-NIZK with applications, 627-656 [Zbl 1446.94093]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
PDFBibTeX XMLCite
Full Text: DOI