Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. (English) Zbl 1301.94003

Lecture Notes in Computer Science 8873. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). xx, 574 p. (2014).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1275.94007; Zbl 1275.94008]. For Part II of the present conference see [Zbl 1301.94002].
Indexed articles:
Guo, Qian; Johansson, Thomas; Löndahl, Carl, Solving LPN using covering codes, 1-20 [Zbl 1306.94059]
Faugère, Jean-Charles; Perret, Ludovic; de Portzamparc, Frédéric, Algebraic attack against variants of McEliece with Goppa polynomial of a special form, 21-41 [Zbl 1306.94051]
Boneh, Dan; Corrigan-Gibbs, Henry, Bivariate polynomials modulo composites and their applications, 42-62 [Zbl 1306.94032]
Biryukov, Alex; Bouillaguet, Charles; Khovratovich, Dmitry, Cryptographic schemes based on the ASASA structure: black-box, white-box, and public-key (extended abstract), 63-84 [Zbl 1306.94030]
Jovanovic, Philipp; Luykx, Atul; Mennink, Bart, Beyond \(2^{c/2}\) security in sponge-based authenticated encryption modes, 85-104 [Zbl 1306.94065]
Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul; Mennink, Bart; Mouha, Nicky; Yasuda, Kan, How to securely release unverified plaintext in authenticated encryption, 105-125 [Zbl 1306.94021]
Nandi, Mridul, Forging attacks on two authenticated encryption schemes COBRA and POET, 126-140 [Zbl 1306.94078]
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong, Low probability differentials and the cryptanalysis of full-round CLEFIA-128, 141-157 [Zbl 1306.94050]
Sun, Siwei; Hu, Lei; Wang, Peng; Qiao, Kexin; Ma, Xiaoshuang; Song, Ling, Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers, 158-178 [Zbl 1306.94093]
Boura, Christina; Naya-Plasencia, María; Suder, Valentin, Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon, 179-199 [Zbl 1306.94035]
Gilbert, Henri, A simplified representation of AES, 200-222 [Zbl 1306.94054]
Longo, Jake; Martin, Daniel P.; Oswald, Elisabeth; Page, Daniel; Stam, Martijn; Tunstall, Michael J., Simulatable leakage: analysis, pitfalls, and new constructions, 223-242 [Zbl 1306.94073]
Mather, Luke; Oswald, Elisabeth; Whitnall, Carolyn, Multi-target DPA attacks: pushing DPA beyond the limits of a desktop computer, 243-261 [Zbl 1306.94074]
Aranha, Diego F.; Fouque, Pierre-Alain; Gérard, Benoît; Kammerer, Jean-Gabriel; Tibouchi, Mehdi; Zapalowicz, Jean-Christophe, GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias, 262-281 [Zbl 1306.94023]
Veyrat-Charvillon, Nicolas; Gérard, Benoît; Standaert, François-Xavier, Soft analytical side-channel attacks, 282-296 [Zbl 1306.94096]
Doche, Christophe, On the enumeration of double-base chains with applications to elliptic curve cryptography, 297-316 [Zbl 1306.94049]
Bernstein, Daniel J.; Chuengsatiansup, Chitchanok; Lange, Tanja; Schwabe, Peter, Kummer strikes back: new DH speed records, 317-337 [Zbl 1306.94027]
Hisil, Huseyin; Costello, Craig, Jacobian coordinates on genus 2 curves, 338-357 [Zbl 1306.94062]
Kleinjung, Thorsten; Bos, Joppe W.; Lenstra, Arjen K., Mersenne factorization factory, 358-377 [Zbl 1306.11098]
Joux, Antoine; Pierrot, Cécile, Improving the polynomial time precomputation of Frobenius representation discrete logarithm algorithms. Simplified setting for small characteristic finite fields, 378-397 [Zbl 1306.94064]
Paterson, Kenneth G.; Poettering, Bertram; Schuldt, Jacob C. N., Big bias hunting in Amazonia: large-scale computation and exploitation of RC4 biases (invited paper), 398-419 [Zbl 1306.94082]
Fouque, Pierre-Alain; Joux, Antoine; Mavromati, Chrysanthi, Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE, 420-438 [Zbl 1306.94053]
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi, Cryptanalysis of iterated Even-Mansour schemes with two keys, 439-457 [Zbl 1306.94048]
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu, Meet-in-the-middle attacks on generic Feistel constructions, 458-477 [Zbl 1306.94058]
Nandi, Mridul, XLS is not a strong pseudorandom permutation, 478-490 [Zbl 1306.94079]
Hanser, Christian; Slamanig, Daniel, Structure-preserving signatures on equivalence classes and their application to anonymous credentials, 491-511 [Zbl 1306.94060]
Fleischhacker, Nils; Jager, Tibor; Schröder, Dominique, On tight security proofs for Schnorr signatures, 512-531 [Zbl 1306.94052]
Danezis, George; Fournet, Cédric; Groth, Jens; Kohlweiss, Markulf, Square span programs with applications to succinct NIZK arguments, 532-550 [Zbl 1306.94042]
Benhamouda, Fabrice; Camenisch, Jan; Krenn, Stephan; Lyubashevsky, Vadim; Neven, Gregory, Better zero-knowledge proofs for lattice encryption and their application to group signatures, 551-572 [Zbl 1306.94026]


94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI