ASIACRYPT 2016:
Tsuyoshi Takagi and Jung Hee Cheon (Eds.):
Advances in Cryptology - ASIACRYPT 2016
22nd International Conference on the Theory and Application of Cryptology and Information Security
Hanoi, Vietnam,
December 4-8, 2016
Proceedings.
ASIACRYPT 2016
Organizational Committee
Program Chairs : | Tsuyoshi Takagi and Jung Hee Cheon | |
General Chair : | Duong Hieu Phan |
Program Committee
Elena Andreeva |
Xavier Boyen |
Anne Canteaut |
Chen-Mou Cheng |
Sherman S. M. Chow |
Nico Döttling |
Thomas Eisenbarth |
Georg Fuchsbauer |
Steven D. Galbraith |
Sanjam Garg |
Vipul Goyal |
Jens Groth |
Sylvain Guilley |
Alejandro Hevia |
Viet Tung Hoang |
Antoine Joux |
Xuejia Lai |
Hyung Tae Lee |
Kwangsu Lee |
Dongdai Lin |
Feng-Hao Liu |
Takahiro Matsuda |
Alexander May |
Florian Mendel |
Amir Moradi |
Svetla Nikova |
Tatsuaki Okamoto |
Elisabeth Oswald |
Thomas Peyrin |
Reihaneh Safavi-Naini |
Peter Schwabe |
Jae Hong Seo |
Damien Stehlé |
Ron Steinfeld |
Rainer Steinwandt |
Daisuke Suzuki |
Mehdi Tibouchi |
Yosuke Todo |
Dominique Unruh |
Serge Vaudenay |
Ivan Visconti |
Huaxiong Wang |
Meiqin Wang |
Aaram Yun |
-
Size-Hiding Computation for Multiple Parties
, 937-966,
Goichiro Hanaoka
,
Eiji Okamoto
,
Takashi Nishide
,
Koji Nuida
,
Kazumasa Shinagawa
bib info -
Trick or Tweak: On the (In)security of OTR's Tweaks
, 333-353,
Olivier Sanders
,
Raphael Bost
bib info -
Authenticated Encryption with Variable Stretch
, 396-425,
Serge Vaudenay
,
Reza Reyhanitabar
,
Damian Vizár
bib info -
Adaptive Oblivious Transfer and Generalization
, 217-247,
Céline Chevalier
,
Olivier Blazy
,
Paul Germouty
bib info -
Structure-Preserving Smooth Projective Hashing
, 339-369,
Céline Chevalier
,
Olivier Blazy
bib info -
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
, 908-938,
Eiichiro Fujisaki
,
Keita Xagawa
bib info -
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
, 307-338,
Shengli Liu
,
Shuai Han
,
Lin Lyu
bib info -
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
, 249-274,
Jian Guo
,
Meicheng Liu
,
Ling Song
bib info -
Simpira v2: A Family of Efficient Permutations Using the AES Round Function
, 95-125,
Shay Gueron
,
Nicky Mouha
bib info -
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
, 220-248,
Dan Boneh
,
Henry Corrigan-Gibbs
,
Stuart E. Schechter
bib info -
When Are Fuzzy Extractors Possible?
, 277-306,
Leonid Reyzin
,
Benjamin Fuller
,
Adam D. Smith
bib info -
Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
, 591-623,
Nuttapong Attrapadung
bib info -
Salvaging Weak Security Bounds for Blockcipher-Based Constructions
, 429-454,
Thomas Shrimpton
,
R. Seth Terashima
bib info -
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
, 624-654,
Zhenfu Cao
,
Xiaolei Dong
,
Jie Chen
,
Junqing Gong
bib info -
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem
, 627-647,
Yu Sasaki
,
Ivica Nikolic
bib info -
A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm
, 37-62,
Palash Sarkar
,
Shashank Singh
bib info -
The Kernel Matrix Diffie-Hellman Assumption
, 729-758,
Jorge Luis Villar
,
Paz Morillo
,
Carla RÃÂ fols
bib info -
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
, 648-678,
Dongdai Lin
,
Wentao Zhang
,
Zhenzhen Bao
,
Zejun Xiang
bib info -
Towards Tightly Secure Lattice Short Signature and Id-Based Encryption
, 404-434,
Xavier Boyen
,
Qinyi Li
bib info -
More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22
, 307-329,
Jiwu Jing
,
Yuan Ma
,
Jingqiang Lin
,
Shuangyi Zhu
,
Jia Zhuang
bib info -
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64
, 3-33,
Gregor Leander
,
Yu Sasaki
,
Yosuke Todo
bib info -
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
, 369-395,
Florian Mendel
,
Victor Lomné
,
Maria Eichlseder
,
Christoph Dobraunig
,
Thomas Korak
bib info -
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness
, 126-158,
Andrey Bogdanov
,
Takanori Isobe
,
Elmar Tischhauser
bib info -
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes
, 967-997,
Koutarou Suzuki
,
Ryo Kikuchi
,
Carmen Kempka
bib info -
Optimization of \\mathsf LPN Solving Algorithms
, 703-728,
Serge Vaudenay
,
Sonia Bogos
bib info -
From 5-Pass
MQ
-Based Identification to
MQ
-Based Signatures
, 135-165,
Peter Schwabe
,
Ming-Shing Chen
,
Simona Samardjiska
,
Andreas Hülsing
,
Joost Rijneveld
bib info -
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
, 548-572,
Martijn Stam
,
Elisabeth Oswald
,
Luke Mather
,
Daniel P. Martin
bib info -
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions
, 998-1021,
Martin Hirt
,
Juan A. Garay
,
Vassilis Zikas
,
Sandro Coretti
bib info -
Multi-key Homomorphic Authenticators
, 499-530,
Dario Fiore
,
Aikaterini Mitrokotsa
,
Luca Nizzardo
,
Elena Pagnin
bib info -
Reverse Cycle Walking and Its Applications
, 679-700,
Scott Yilek
,
Sarah Miracle
bib info -
Side-Channel Analysis Protection and Low-Latency in Action - - Case Study of PRINCE and Midori -
, 517-547,
Amir Moradi
,
Tobias Schneider
bib info -
Design Strategies for ARX with Provable Bounds: Sparx and LAX
, 484-513,
Alex Biryukov
,
Vesselin Velichkov
,
Léo Perrin
,
Daniel Dinu
,
Aleksei Udovenko
,
Johann Großschädl
bib info -
Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
, 602-623,
Ventzislav Nikov
,
Martin Feldhofer
,
François-Xavier Standaert
,
Marcel Medwed
bib info -
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
, 191-219,
Christian Rechberger
,
Arnab Roy
,
Martin R. Albrecht
,
Tyge Tiessen
,
Lorenzo Grassi
bib info -
Reactive Garbling: Foundation, Instantiation, Application
, 1022-1052,
Jesper Buus Nielsen
,
Samuel Ranellucci
bib info -
Cliptography: Clipping the Power of Kleptographic Attacks
, 34-64,
Moti Yung
,
Alexander Russell
,
Qiang Tang
,
Hong-Sheng Zhou
bib info -
Collapse-Binding Quantum Commitments Without Random Oracles
, 166-195,
Dominique Unruh
bib info -
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
, 455-483,
Lei Wang
,
Jian Guo
,
Dawu Gu
,
Jingyuan Zhao
,
Guoyan Zhang
bib info -
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
, 573-601,
Sylvain Guilley
,
Yannick Teglia
,
François-Xavier Standaert
,
Annelie Heuser
,
Olivier Rioul
,
Nicolas Bruneau
bib info -
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
, 354-368,
Ferhat Karakoç
,
Asli Bay
,
Oguzhan Ersoy
bib info -
Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
, 655-681,
Melissa Chase
,
Sarah Meiklejohn
,
Mary Maller
bib info -
Indistinguishable Proofs of Work or Knowledge
, 902-933,
Aggelos Kiayias
,
Foteini Baldimtsi
,
Bingsheng Zhang
,
Thomas Zacharias
bib info -
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
, 877-907,
Daniele Venturi
,
Antonio Faonio
bib info -
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
, 682-712,
Shota Yamada
,
Shuichi Katsumata
bib info -
How to Generate and Use Universal Samplers
, 715-744,
Dennis Hofheinz
,
Amit Sahai
,
Brent Waters
,
Tibor Jager
,
Mark Zhandry
,
Dakshita Khurana
bib info -
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
, 777-804,
Mihir Bellare
,
Georg Fuchsbauer
,
Alessandra Scafuro
bib info -
Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds
, 3-33,
Nicolas Gama
,
Mariya Georgieva
,
Malika Izabachène
,
Ilaria Chillotti
bib info -
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
, 373-403,
Benoít Libert
,
Huaxiong Wang
,
San Ling
,
Khoa Nguyen
,
Fabrice Mouhartem
bib info -
Digital Signatures Based on the Hardness of Ideal Lattice Problems in All Rings
, 196-214,
Vadim Lyubashevsky
bib info -
Selective Opening Security from Simulatable Data Encapsulation
, 248-277,
Bertram Poettering
,
Felix Heuer
bib info -
Multi-input Functional Encryption with Unbounded-Message Security
, 531-556,
Vipul Goyal
,
Adam O'Neill
,
Aayush Jain
bib info -
Zero-Knowledge Accumulators and Set Algebra
, 67-100,
Roberto Tamassia
,
Nikos Triandopoulos
,
Dimitrios Papadopoulos
,
Esha Ghosh
,
Olga Ohrimenko
bib info -
From Identification to Signatures, Tightly: A Framework and Generic Transforms
, 435-464,
Mihir Bellare
,
Douglas Stebila
,
Bertram Poettering
bib info -
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption
, 101-131,
Benoít Libert
,
Huaxiong Wang
,
San Ling
,
Khoa Nguyen
,
Fabrice Mouhartem
bib info -
Universal Composition with Responsive Environments
, 807-840,
Jan Camenisch
,
Stephan Krenn
,
Ralf Küsters
,
Robert R. Enderlein
,
Daniel Rausch
bib info -
Selective-Opening Security in the Presence of Randomness Failures
, 278-306,
Jonathan Katz
,
Adam O'Neill
,
Viet Tung Hoang
,
Mohammad Zaheri
bib info -
Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials
, 759-788,
Brett Hemenway
,
Nadia Heninger
,
Ted Chinburg
,
Zachary Scherr
bib info -
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
, 789-815,
Thomas Johansson
,
Paul Stankovski
,
Qian Guo
bib info -
On the Security of Supersingular Isogeny Cryptosystems
, 63-91,
Steven D. Galbraith
,
Christophe Petit
,
Barak Shani
,
Yan Bo Ti
bib info -
Verifiable Functional Encryption
, 557-587,
Vipul Goyal
,
Amit Sahai
,
Saikrishna Badrinarayanan
,
Aayush Jain
bib info -
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones
, 465-495,
Goichiro Hanaoka
,
Keisuke Tanaka
,
Zongyang Zhang
,
Takahiro Matsuda
,
Yuyu Wang
bib info -
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile - and Why It Is Not
, 819-843,
Thomas Eisenbarth
,
Cong Chen
,
Mohammad Farmani
bib info -
A Shuffle Argument Secure in the Generic Model
, 841-872,
Helger Lipmaa
,
Prastudy Fauzi
,
Michal Zajac
bib info -
Efficient and Provable White-Box Primitives
, 159-188,
Pierre-Alain Fouque
,
Pierre Karpman
,
Brice Minaud
,
Paul Kirchner
bib info -
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
, 844-876,
Willy Susilo
,
Guomin Yang
,
Yi Mu
,
Mingwu Zhang
,
Rongmao Chen
,
Fuchun Guo
bib info -
Efficient Public-Key Distance Bounding Protocol
, 873-901,
Serge Vaudenay
,
Handan Kilinç
bib info -
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction
, 745-776,
Willy Susilo
,
Guomin Yang
,
Yi Mu
,
Rongmao Chen
,
Fuchun Guo
,
Jianchang Lai
bib info