zbMATH — the first resource for mathematics

Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. (English) Zbl 1227.94002
Lecture Notes in Computer Science 7073. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). xiv, 760 p. (2011).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see Zbl 1202.94006.
Indexed articles:
Chen, Yuanmi; Nguyen, Phong Q., BKZ 2.0: Better lattice security estimates, 1-20 [Zbl 1227.94037]
Agrawal, Shweta; Freeman, David Mandell; Vaikuntanathan, Vinod, Functional encryption for inner product predicates from learning with errors, 21-40 [Zbl 1227.94023]
Boneh, Dan; Dagdelen, Özgür; Fischlin, Marc; Lehmann, Anja; Schaffner, Christian; Zhandry, Mark, Random oracles in a quantum world, 41-69 [Zbl 1227.94033]
Hemenway, Brett; Libert, Benoît; Ostrovsky, Rafail; Vergnaud, Damien, Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security, 70-88 [Zbl 1227.94048]
Camenisch, Jan; Haralambiev, Kristiyan; Kohlweiss, Markulf; Lapon, Jorn; Naessens, Vincent, Structure preserving CCA secure encryption and applications, 89-106 [Zbl 1227.94034]
May, Alexander; Meurer, Alexander; Thomae, Enrico, Decoding random linear codes in \(\tilde{\mathcal{O}}(2^{0.054n})\), 107-124 [Zbl 1227.94055]
Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio, Lower and upper bounds for deniable public-key encryption, 125-142 [Zbl 1227.94029]
Wu, Qianhong; Qin, Bo; Zhang, Lei; Domingo-Ferrer, Josep; Farràs, Oriol, Bridging broadcast encryption and group key agreement, 143-160 [Zbl 1227.94067]
Paterson, Kenneth G.; Schuldt, Jacob C. N.; Stam, Martijn; Thomson, Susan, On the joint security of encryption and signature, revisited, 161-178 [Zbl 1227.94061]
Albrecht, Martin R.; Farshim, Pooya; Faugère, Jean-Charles; Perret, Ludovic, Polly cracker, revisited, 179-196 [Zbl 1227.94025]
Shi, Elaine; Chan, T.-H. Hubert; Stefanov, Emil; Li, Mingfei, Oblivious RAM with \(O((\log N)^{3})\) worst-case cost, 197-214 [Zbl 1227.68025]
Bhaskar, Raghav; Bhowmick, Abhishek; Goyal, Vipul; Laxman, Srivatsan; Thakurta, Abhradeep, Noiseless database privacy, 215-232 [Zbl 1227.94030]
Armknecht, Frederik; Fleischmann, Ewan; Krause, Matthias; Lee, Jooyoung; Stam, Martijn; Steinberger, John, The preimage security of double-block-length compression functions, 233-251 [Zbl 1227.94026]
Naya-Plasencia, María; Toz, Deniz; Varici, Kerem, Rebound attack on JH42, 252-269 [Zbl 1227.94058]
Biryukov, Alex; Lamberger, Mario; Mendel, Florian; Nikolić, Ivica, Second-order differential collisions for reduced SHA-256, 270-287 [Zbl 1227.94031]
Mendel, Florian; Nad, Tomislav; Schläffer, Martin, Finding SHA-2 characteristics: searching through a minefield of contradictions, 288-307 [Zbl 1227.94056]
Abdelraheem, Mohamed Ahmed; Blondeau, Céline; Naya-Plasencia, María; Videau, Marion; Zenner, Erik, Cryptanalysis of ARMADILLO2, 308-326 [Zbl 1227.94019]
Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf, An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware, 327-343 [Zbl 1227.94042]
Bogdanov, Andrey; Khovratovich, Dmitry; Rechberger, Christian, Biclique cryptanalysis of the full AES, 344-371 [Zbl 1227.94032]
Paterson, Kenneth G.; Ristenpart, Thomas; Shrimpton, Thomas, Tag size does matter: attacks and proofs for the TLS record protocol, 372-389 [Zbl 1227.94060]
Deng, Yi; Feng, Dengguo; Goyal, Vipul; Lin, Dongdai; Sahai, Amit; Yung, Moti, Resettable cryptography in constant rounds – the case of zero knowledge, 390-406 [Zbl 1227.94041]
Crépeau, Claude; Salvail, Louis; Simard, Jean-Raymond; Tapp, Alain, Two provers in isolation, 407-430 [Zbl 1227.94040]
Groth, Jens, Efficient zero-knowledge arguments from two-tiered homomorphic commitments, 431-448 [Zbl 1227.94047]
Camenisch, Jan; Krenn, Stephan; Shoup, Victor, A framework for practical universally composable zero-knowledge protocols, 449-467 [Zbl 1227.94036]
Fischlin, Marc; Libert, Benoît; Manulis, Mark, Non-interactive and re-usable universally composable string commitments with adaptive security, 468-485 [Zbl 1227.94044]
Bellare, Mihir; Cash, David; Miller, Rachel, Cryptography secure against related-key attacks and tampering, 486-503 [Zbl 1227.94028]
Gaudry, Pierrick; Kohel, David; Smith, Benjamin, Counting points on genus 2 curves with real multiplication, 504-519 [Zbl 1227.94045]
Ranellucci, Samuel; Tapp, Alain; Winkler, Severin; Wullschleger, Jürg, On the efficiency of bit commitment reductions, 520-537 [Zbl 1227.94062]
Yang, Qiushi; Desmedt, Yvo, Secure communication in multicast graphs, 538-555 [Zbl 1227.94068]
Katz, Jonathan; Malka, Lior, Constant-round private function evaluation with linear complexity, 556-571 [Zbl 1227.94050]
Ning, Chao; Xu, Qiuliang, Constant-rounds, linear multi-party computation for exponentiation and modulo reduction with perfect security, 572-589 [Zbl 1227.94059]
Backes, Michael; Kate, Aniket; Patra, Arpita, Computational verifiable secret sharing revisited, 590-609 [Zbl 1227.94071]
Farràs, Oriol; Padró, Carles; Xing, Chaoping; Yang, An, Natural generalizations of threshold secret sharing, 610-627 [Zbl 1227.94077]
Abe, Masayuki; Groth, Jens; Ohkubo, Miyako, Separating short structure-preserving signatures from non-interactive assumptions, 628-646 [Zbl 1227.94070]
Hofheinz, Dennis; Jager, Tibor; Kiltz, Eike, Short signatures from weaker assumptions, 647-666 [Zbl 1227.94079]
Bouillaguet, Charles; Fouque, Pierre-Alain; Macario-Rat, Gilles, Practical key-recovery for all possible parameters of SFLASH, 667-685 [Zbl 1227.94072]
Aggarwal, Divesh; Maurer, Ueli, The leakage-resilience limit of a computational problem is equal to its unpredictability entropy, 686-701 [Zbl 1227.94021]
Dziembowski, Stefan; Faust, Sebastian, Leakage-resilient cryptography from the inner-product extractor, 702-721 [Zbl 1227.94043]
Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N., Program obfuscation with leaky hardware, 722-739 [Zbl 1227.68023]
Choi, Seung Geol; Kiayias, Aggelos; Malkin, Tal, BiTR: built-in tamper resilience, 740-758 [Zbl 1227.94038]

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI