ASIACRYPT 2011:
Xiaoyun Wang and Dong Hoon Lee (Eds.):
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2011,
Seoul,
South Korea,
December 4-8, 2011
Proceedings.
ASIACRYPT 2011
South Korea,
December 4-8, 2011
Organizational Committee
Program Chairs : | Xiaoyun Wang and Dong Hoon Lee | |
General Chair : | Hyoung Joong Kim |
Program Committee
Michel Abdalla | Masayuki Abe | |
Kazumaro Aoki | Jung Hee Cheon | |
Carlos Cid | Craig Gentry | |
Jens Groth | Iftach Haitner | |
Dennis Hofheinz | Antoine Joux | |
Aggelos Kiayias | Eike Kiltz | |
Jongsung Kim | Lars R. Knudsen | |
Arjen K. Lenstra | Stefan Lucks | |
Willi Meier | Alfred Menezes | |
Payman Mohassel | Phong Q. Nguyen | |
Jesper Buus Nielsen | Chris Peikert | |
Thomas Peyrin | Christian Rechberger | |
Palash Sarkar | Nigel P. Smart | |
Willy Susilo | Hoeteck Wee | |
Hongbo Yu |
External Referees
-
Lattices and Quantum Cryptography
-
BKZ 2.0: Better Lattice Security Estimates
, 1-20,
Phong Q. Nguyen
,
Yuanmi Chen
bib info -
Functional Encryption for Inner Product Predicates from Learning with Errors
, 21-40,
Vinod Vaikuntanathan
,
David Mandell Freeman
,
Shweta Agrawal
bib info -
Random Oracles in a Quantum World
, 41-69,
Marc Fischlin
,
Dan Boneh
,
Anja Lehmann
,
Christian Schaffner
,
Özgür Dagdelen
,
Mark Zhandry
bib info
-
BKZ 2.0: Better Lattice Security Estimates
, 1-20,
Phong Q. Nguyen
,
Yuanmi Chen
-
Public Key Encryption I
-
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
, 70-88,
Benoît Libert
,
Rafail Ostrovsky
,
Damien Vergnaud
,
Brett Hemenway
bib info -
Structure Preserving CCA Secure Encryption and Applications
, 89-106,
Jan Camenisch
,
Markulf Kohlweiss
,
Kristiyan Haralambiev
,
Jorn Lapon
,
Vincent Naessens
bib info -
Decoding Random Linear Codes in ~O(2
0.054n
)
, 107-124,
Alexander May
,
Alexander Meurer
,
Enrico Thomae
bib info -
Lower and Upper Bounds for Deniable Public-Key Encryption
, 125-142,
Jesper Buus Nielsen
,
Claudio Orlandi
,
Rikke Bendlin
,
Peter Sebastian Nordholt
bib info
-
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
, 70-88,
Benoît Libert
,
Rafail Ostrovsky
,
Damien Vergnaud
,
Brett Hemenway
-
Public Key Encryption II
-
Bridging Broadcast Encryption and Group Key Agreement
, 143-160,
Josep Domingo-Ferrer
,
Oriol Farràs
,
Bo Qin
,
Qianhong Wu
,
Lei Zhang
bib info -
On the Joint Security of Encryption and Signature, Revisited
, 161-178,
Kenneth G. Paterson
,
Martijn Stam
,
Jacob C. N. Schuldt
,
Susan Thomson
bib info -
Polly Cracker, Revisited
, 179-196,
Jean-Charles Faugère
,
Ludovic Perret
,
Pooya Farshim
,
Martin R. Albrecht
bib info
-
Bridging Broadcast Encryption and Group Key Agreement
, 143-160,
Josep Domingo-Ferrer
,
Oriol Farràs
,
Bo Qin
,
Qianhong Wu
,
Lei Zhang
- Database Privacy
-
Hash Function
-
The Preimage Security of Double-Block-Length Compression Functions
, 233-251,
Martijn Stam
,
Frederik Armknecht
,
Matthias Krause
,
John P. Steinberger
,
Jooyoung Lee
,
Ewan Fleischmann
bib info -
Rebound Attack on JH42
, 252-269,
María Naya-Plasencia
,
Kerem Varici
,
Deniz Toz
bib info -
Second-Order Differential Collisions for Reduced SHA-256
, 270-287,
Alex Biryukov
,
Florian Mendel
,
Mario Lamberger
,
Ivica Nikolic
bib info -
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
, 288-307,
Florian Mendel
,
Martin Schläffer
,
Tomislav Nad
bib info
-
The Preimage Security of Double-Block-Length Compression Functions
, 233-251,
Martijn Stam
,
Frederik Armknecht
,
Matthias Krause
,
John P. Steinberger
,
Jooyoung Lee
,
Ewan Fleischmann
-
Symmetric Key Encryption
-
Cryptanalysis of ARMADILLO2
, 308-326,
Marion Videau
,
María Naya-Plasencia
,
Erik Zenner
,
Céline Blondeau
,
Mohamed Ahmed Abdelraheem
bib info -
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
, 327-343,
Adi Shamir
,
Christof Paar
,
Itai Dinur
,
Tim Güneysu
,
Ralf Zimmermann
bib info -
Biclique Cryptanalysis of the Full AES
, 344-371,
Christian Rechberger
,
Andrey Bogdanov
,
Dmitry Khovratovich
bib info -
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
, 372-389,
Kenneth G. Paterson
,
Thomas Ristenpart
,
Thomas Shrimpton
bib info
-
Cryptanalysis of ARMADILLO2
, 308-326,
Marion Videau
,
María Naya-Plasencia
,
Erik Zenner
,
Céline Blondeau
,
Mohamed Ahmed Abdelraheem
-
Zero Knowledge Proof
-
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge
, 390-406,
Moti Yung
,
Vipul Goyal
,
Amit Sahai
,
Dengguo Feng
,
Dongdai Lin
,
Yi Deng
bib info -
Two Provers in Isolation
, 407-430,
Alain Tapp
,
Claude Crépeau
,
Louis Salvail
,
Jean-Raymond Simard
bib info -
Efficient Zero-Knowledge Arguments from Two-Tiered Homomorphic Commitments
, 431-448,
Jens Groth
bib info
-
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge
, 390-406,
Moti Yung
,
Vipul Goyal
,
Amit Sahai
,
Dengguo Feng
,
Dongdai Lin
,
Yi Deng
- Universal Composability
-
Foundation
-
Cryptography Secure against Related-Key Attacks and Tampering
, 486-503,
Mihir Bellare
,
David Cash
,
Rachel Miller
bib info -
Counting Points on Genus 2 Curves with Real Multiplication
, 504-519,
Pierrick Gaudry
,
David R. Kohel
,
Benjamin A. Smith
bib info -
On the Efficiency of Bit Commitment Reductions
, 520-537,
Alain Tapp
,
Jürg Wullschleger
,
Severin Winkler
,
Samuel Ranellucci
bib info -
Secure Communication in Multicast Graphs
, 538-555,
Yvo Desmedt
,
Qiushi Yang
bib info
-
Cryptography Secure against Related-Key Attacks and Tampering
, 486-503,
Mihir Bellare
,
David Cash
,
Rachel Miller
-
Secure Computation and Secret Sharing
-
Constant-Round Private Function Evaluation with Linear Complexity
, 556-571,
Jonathan Katz
,
Lior Malka
bib info -
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security
, 572-589,
Chao Ning
,
Qiuliang Xu
bib info -
Computational Verifiable Secret Sharing Revisited
, 590-609,
Michael Backes
,
Aniket Kate
,
Arpita Patra
bib info -
Natural Generalizations of Threshold Secret Sharing
, 610-627,
Chaoping Xing
,
Oriol Farràs
,
Carles Padró
,
An Yang
bib info
-
Constant-Round Private Function Evaluation with Linear Complexity
, 556-571,
Jonathan Katz
,
Lior Malka
-
Public Key Signature
-
Separating Short Structure-Preserving Signatures from Non-interactive Assumptions
, 628-646,
Masayuki Abe
,
Miyako Ohkubo
,
Jens Groth
bib info -
Short Signatures from Weaker Assumptions
, 647-666,
Eike Kiltz
,
Dennis Hofheinz
,
Tibor Jager
bib info -
Practical Key-Recovery for All Possible Parameters of SFLASH
, 667-685,
Pierre-Alain Fouque
,
Charles Bouillaguet
,
Gilles Macario-Rat
bib info
-
Separating Short Structure-Preserving Signatures from Non-interactive Assumptions
, 628-646,
Masayuki Abe
,
Miyako Ohkubo
,
Jens Groth
-
Leakage Resilient Cryptography
-
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
, 686-701,
Ueli M. Maurer
,
Divesh Aggarwal
bib info -
Leakage-Resilient Cryptography from the Inner-Product Extractor
, 702-721,
Stefan Dziembowski
,
Sebastian Faust
bib info -
Program Obfuscation with Leaky Hardware
, 722-739,
Shai Halevi
,
Ran Canetti
,
Shafi Goldwasser
,
Yael Tauman Kalai
,
Guy N. Rothblum
,
Nir Bitansky
bib info -
BiTR: Built-in Tamper Resilience
, 740-758,
Aggelos Kiayias
,
Seung Geol Choi
,
Tal Malkin
bib info
-
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
, 686-701,
Ueli M. Maurer
,
Divesh Aggarwal