ASIACRYPT 2013:
Kazue Sako and Palash Sarkar (Eds.):
Advances in Cryptology - ASIACRYPT 2013
19th International Conference on the Theory and Application of Cryptology and Information Security
Bengaluru, India,
December 1-5, 2013,
Proceedings Vols. I and II
ASIACRYPT 2013
Organizational Committee
Program Chairs : | Kazue Sako | Palash Sarkar | |
General Chair : | Satyanarayana V. Lokam | ||
Other Organizers | |||
Raghav Bhaskar | |||
Vipul Goyal | |||
Neeraj Kayal | |||
Satyanarayana V. Lokam | |||
C. Pandurangan | |||
Govindan Rangarajan |
Program Committee
Michel Abdalla |
Colin Boyd |
Anne Canteaut |
Sanjit Chatterjee |
Jung Hee Cheon |
Sherman S. M. Chow |
Orr Dunkelman |
Kris Gaj |
Pierrick Gaudry |
Rosario Gennaro |
Guang Gong |
Vipul Goyal |
Tetsu Iwata |
Eike Kiltz |
Tanja Lange |
Dong Hoon Lee |
Allison B. Lewko |
Benoît Libert |
Dongdai Lin |
Anna Lysyanskaya |
Subhamoy Maitra |
Willi Meier |
Phong Q. Nguyen |
Kaisa Nyberg |
Satoshi Obana |
Kenneth G. Paterson |
David Pointcheval |
Manoj Prabhakaran |
Vincent Rijmen |
Reihaneh Safavi-Naini |
Palash Sarkar |
Yu Sasaki |
Peter Schwabe |
Nicolas Sendrier |
Thomas Shrimpton |
Nigel P. Smart |
François-Xavier Standaert |
Damien Stehlé |
Willy Susilo |
Tsuyoshi Takagi |
Vinod Vaikuntanathan |
Frederik Vercauteren |
Xiaoyun Wang |
Hoeteck Wee |
Hongjun Wu |
External Referees
-
New Generic Attacks against Hash-Based MACs
, 1-20,
Gaëtan Leurent
,
Thomas Peyrin
,
Lei Wang
bib info -
Cryptanalysis of HMAC/NMAC-Whirlpool
, 21-40,
Yu Sasaki
,
Lei Wang
,
Jian Guo
,
Shuang Wu
bib info -
Lattice-Based Group Signatures with Logarithmic Signature Size
, 41-61,
Benoît Libert
,
Fabien Laguillaumie
,
Damien Stehlé
,
Adeline Langlois
bib info -
The Fiat-Shamir Transformation in a Quantum World
, 62-81,
Marc Fischlin
,
Ögür Dagdelen
,
Tommaso Gagliardoni
bib info -
On the Security of One-Witness Blind Signature Schemes
, 82-99,
Anna Lysyanskaya
,
Foteini Baldimtsi
bib info - Invited Talk: Engineering Privacy-Friendly Computations , George Danezis
-
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
, 100-119,
Ivan Damgård
,
Alessandra Scafuro
bib info -
Functional Encryption from (Small) Hardware Tokens
, 120-139,
Jonathan Katz
,
Hong-Sheng Zhou
,
Kai-Min Chung
bib info -
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
, 140-160,
Ivan Damgård
,
Sebastian Faust
,
Daniele Venturi
,
Pratyay Mukherjee
bib info -
Tamper Resilient Circuits: The Adversary at the Gates
, 161-180,
Aggelos Kiayias
,
Yiannis Tselekounis
bib info -
Efficient General-Adversary Multi-Party Computation
, 181-200,
Martin Hirt
,
Daniel Tschudi
bib info -
Fair and Efficient Secure Multiparty Computation with Reputation Systems
, 201-220,
Yehuda Lindell
,
Hila Zarosim
,
Gilad Asharov
bib info -
Between a Rock and a Hard Place: Interpolating between MPC and FHE
, 221-240,
Nigel P. Smart
,
Arpita Patra
,
Ashish Choudhury
,
Jake Loftus
,
Emmanuela Orsini
bib info -
Building Lossy Trapdoor Functions from Lossy Encryption
, 241-260,
Rafail Ostrovsky
,
Brett Hemenway
bib info -
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters
, 261-279,
Jian Weng
,
Xiangxue Li
,
Yu Yu
bib info -
Constrained Pseudorandom Functions and Their Applications
, 280-300,
Dan Boneh
,
Brent Waters
bib info -
Fully Homomorphic Message Authenticators
, 301-320,
Rosario Gennaro
,
Daniel Wichs
bib info -
Non-uniform Cracks in the Concrete: The Power of Free Precomputation
, 321-340,
Daniel J. Bernstein
,
Tanja Lange
bib info -
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild
, 341-360,
Daniel J. Bernstein
,
Tanja Lange
,
Chen-Mou Cheng
,
Nadia Heninger
,
Yun-An Chang
,
Li-Ping Chou
,
Nicko van Someren
bib info -
Naturally Rehearsing Passwords
, 361-380,
Manuel Blum
,
Anupam Datta
,
Jeremiah Blocki
bib info -
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
, 381-400,
Shengli Liu
,
Baodong Qin
bib info -
On Continual Leakage of Discrete Log Representations
, 401-420,
Vinod Vaikuntanathan
,
Yevgeniy Dodis
,
Daniel Wichs
,
Shweta Agrawal
bib info -
Hiding the Input-Size in Secure Two-Party Computation
, 421-440,
Yehuda Lindell
,
Kobbi Nissim
,
Claudio Orlandi
bib info -
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique - (Extended Abstract)
, 441-463,
Luís T. A. N. Brandão
bib info -
A Heuristic for Finding Compatible Differential Paths with Application to HAS-160
, 464-483,
Amr M. Youssef
,
Aleksandar Kircanski
,
Riham AlTawy
bib info -
Improved Cryptanalysis of Reduced RIPEMD-160
, 484-503,
Thomas Peyrin
,
Florian Mendel
,
Martin Schläffer
,
Lei Wang
,
Shuang Wu
bib info -
Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful
, 504-523,
Thomas Peyrin
,
Yu Sasaki
,
Mitsugu Iwamoto
bib info -
On Diamond Structures and Trojan Message Attacks
, 524-539,
Tuomas Kortelainen
,
Juha Kortelainen
bib info - Volume 2
- Inivited Talk, Block Ciphers - Past and Present , Lars Ramkilde Knudsen
-
Random Projections, Graph Sparsification, and Differential Privacy
, 276-295,
Jalaj Upadhyay
bib info -
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE
, 377-404,
Hongjun Wu
,
Mingsheng Wang
,
Wenling Wu
,
Shengbao Wu
,
Tao Huang
bib info -
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited
, 134-153,
Ueli Maurer
,
Sandro Coretti
,
Björn Tackmann
bib info -
Reset Indifferentiability and Its Consequences
, 154-173,
Christina Brzuska
,
Paul Baecher
,
Arno Mittelbach
bib info -
New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography
, 117-133,
Henri Gilbert
,
Gilles Macario-Rat
,
Jérôme Plût
bib info -
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
, 1-20,
Charanjit S. Jutla
,
Arnab Roy
bib info -
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
, 486-505,
Elisabeth Oswald
,
Marcin Wójcik
,
Luke Mather
,
Joe Bandenburg
bib info -
Generic Key Recovery Attack on Feistel Scheme
, 464-485,
Kyoji Shibutani
,
Takanori Isobe
bib info -
Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization
, 194-213,
Renato Renner
,
Joseph M. Renes
,
David Sutter
bib info -
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
, 337-356,
Orr Dunkelman
,
Nathan Keller
,
Adi Shamir
,
Itai Dinur
bib info -
Four-Dimensional GLV via the Weil Restriction
, 79-96,
Sorina Ionica
,
Aurore Guillevic
bib info -
How to Construct an Ideal Cipher from a Small Set of Public Permutations
, 444-463,
Yannick Seurin
,
Rodolphe Lampe
bib info -
Behind the Scene of Side Channel Attacks
, 506-525,
Emmanuel Prouff
,
Thomas Roche
,
Victor Lomné
bib info -
Notions of Black-Box Reductions, Revisited
, 296-315,
Marc Fischlin
,
Christina Brzuska
,
Paul Baecher
bib info -
Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments
, 316-336,
Tal Malkin
,
Muthuramakrishnan Venkitasubramaniam
,
Dana Dachman-Soled
,
Mariana Raykova
bib info -
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model
, 21-40,
Ivan Visconti
,
Rafail Ostrovsky
,
Vipul Goyal
,
Abhishek Jain
,
Silas Richelson
bib info -
Key Difference Invariant Bias in Block Ciphers
, 357-376,
Vincent Rijmen
,
Andrey Bogdanov
,
Meiqin Wang
,
Christina Boura
,
Long Wen
,
Jingyuan Zhao
bib info -
SPHF-Friendly Non-interactive Commitments
, 214-234,
Michel Abdalla
,
David Pointcheval
,
Olivier Blazy
,
Fabrice Benhamouda
,
Céline Chevalier
bib info -
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
, 41-60,
Helger Lipmaa
bib info -
A Modular Framework for Building Variable-Input-Length Tweakable Ciphers
, 405-423,
Thomas Shrimpton
,
R. Seth Terashima
bib info -
Families of Fast Elliptic Curves from ℚ-curves
, 61-78,
Benjamin Smith
bib info -
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
, 235-254,
Moti Yung
,
Dong Hoon Lee
,
Seung Geol Choi
,
Kwangsu Lee
,
Jong Hwan Park
bib info -
Function-Private Subspace-Membership Encryption and Its Applications
, 255-275,
Dan Boneh
,
Gil Segev
,
Ananth Raghunathan
bib info -
Parallelizable and Authenticated Online Ciphers
, 424-443,
Elena Andreeva
,
Kan Yasuda
,
Andrey Bogdanov
,
Bart Mennink
,
Elmar Tischhauser
,
Atul Luykx
bib info -
Discrete Gaussian Leftover Hash Lemma over Infinite Domains
, 97-116,
Shai Halevi
,
Craig Gentry
,
Amit Sahai
,
Shweta Agrawal
bib info -
SCARE of Secret Ciphers with SPN Structures
, 526-544,
Matthieu Rivain
,
Thomas Roche
bib info