ASIACRYPT 2014:
Palash Sarkar and Tetsu Iwata (Eds.):
Advances in Cryptology - ASIACRYPT 2014
20th International Conference on the Theory and Application of Cryptology and Information Security
Kaoshiung, Taiwan, R.O.C.,
December 7-11, 2014
Proceedings.
ASIACRYPT
2014, Vol. 1
ASIACRYPT 2014, Vol. 2
Organizational Committee
Program Chairs : | Palash Sarkar and Tetsu Iwata | |
General Chair : | D. J. Guan |
- Cryptology and Coding Theory
- New Proposals
-
Authenticated Encryption
-
Beyond 2
c/2
Security in Sponge-Based Authenticated Encryption Modes
, 85-104,
Bart Mennink
,
Atul Luykx
,
Philipp Jovanovic
bib info -
How to Securely Release Unverified Plaintext in Authenticated Encryption
, 105-125,
Elena Andreeva
,
Kan Yasuda
,
Andrey Bogdanov
,
Bart Mennink
,
Nicky Mouha
,
Atul Luykx
bib info -
Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET
, 126-140,
Mridul Nandi
bib info
-
Beyond 2
c/2
Security in Sponge-Based Authenticated Encryption Modes
, 85-104,
Bart Mennink
,
Atul Luykx
,
Philipp Jovanovic
- Symmetric Key Encryption
-
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
, 141-157,
Josef Pieprzyk
,
Huaxiong Wang
,
San Ling
,
Ivica Nikolic
,
Sareh Emami
bib info -
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
, 158-178,
Lei Hu
,
Peng Wang
,
Xiaoshuang Ma
,
Kexin Qiao
,
Siwei Sun
,
Ling Song
bib info -
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
, 179-199,
María Naya-Plasencia
,
Christina Boura
,
Valentin Suder
bib info -
A Simplified Representation of AES
, 200-222,
Henri Gilbert
bib info - Side Channel Analysis I
-
Simulatable Leakage: Analysis, Pitfalls, and New Constructions
, 223-242,
Martijn Stam
,
Elisabeth Oswald
,
Michael Tunstall
,
Jake Longo Galea
,
Daniel Page
,
Daniel P. Martin
bib info -
Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer
, 243-261,
Elisabeth Oswald
,
Carolyn Whitnall
,
Luke Mather
bib info -
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias
, 262-281,
Pierre-Alain Fouque
,
Benoît Gérard
,
Mehdi Tibouchi
,
Jean-Gabriel Kammerer
,
Diego F. Aranha
,
Jean-Christophe Zapalowicz
bib info -
Soft Analytical Side-Channel Attacks
, 282-296,
François-Xavier Standaert
,
Nicolas Veyrat-Charvillon
,
Benoît Gérard
bib info - Hyperelliptic Curve Cryptography
-
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
, 297-316,
Christophe Doche
bib info -
Kummer Strikes Back: New DH Speed Records
, 317-337,
Daniel J. Bernstein
,
Tanja Lange
,
Peter Schwabe
,
Chitchanok Chuengsatiansup
bib info -
Jacobian Coordinates on Genus 2 Curves
, 338-357,
Craig Costello
,
Hüseyin Hisil
bib info - Factoring and Discrete Log
-
Mersenne Factorization Factory
, 358-377,
Arjen K. Lenstra
,
Thorsten Kleinjung
,
Joppe W. Bos
bib info -
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
, 378-397,
Antoine Joux
,
Cécile Pierrot
bib info -
Invited Talk:
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)
, 398-419,
Kenneth G. Paterson
,
Jacob C. N. Schuldt
,
Bertram Poettering
bib info -
Cryptanalysis
-
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
, 420-438,
Pierre-Alain Fouque
,
Antoine Joux
,
Chrysanthi Mavromati
bib info -
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
, 439-457,
Orr Dunkelman
,
Nathan Keller
,
Adi Shamir
,
Itai Dinur
bib info -
Meet-in-the-Middle Attacks on Generic Feistel Constructions
, 458-477,
Yu Sasaki
,
Jian Guo
,
Ivica Nikolic
,
Jérémy Jean
bib info -
XLS is Not a Strong Pseudorandom Permutation
, 478-490,
Mridul Nandi
bib info
-
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
, 420-438,
Pierre-Alain Fouque
,
Antoine Joux
,
Chrysanthi Mavromati
- Signatures
-
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials
, 491-511,
Daniel Slamanig
,
Christian Hanser
bib info -
On Tight Security Proofs for Schnorr Signatures
, 512-531,
Tibor Jager
,
Dominique Schröder
,
Nils Fleischhacker
bib info - Zero-Knowledge
-
Square Span Programs with Applications to Succinct NIZK Arguments
, 532-550,
Jens Groth
,
George Danezis
,
Markulf Kohlweiss
,
Cédric Fournet
bib info -
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures
, 551-572,
Jan Camenisch
,
Gregory Neven
,
Vadim Lyubashevsky
,
Stephan Krenn
,
Fabrice Benhamouda
bib info - Encryption Schemes
-
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security
, 1-21,
Benoît Libert
,
Moti Yung
,
Marc Joye
,
Thomas Peters
bib info -
Efficient Identity-Based Encryption over NTRU Lattices
, 22-41,
Vadim Lyubashevsky
,
Léo Ducas
,
Thomas Prest
bib info -
Order-Preserving Encryption Secure Beyond One-Wayness
, 42-61,
Moti Yung
,
Tal Malkin
,
Isamu Teranishi
bib info - Outsourcing and Delegation
-
Statistically-secure ORAM with Õ(log
2
n) Overhead
, 62-81,
Rafael Pass
,
Kai-Min Chung
,
Zhenming Liu
bib info -
Adaptive Security of Constrained PRFs
, 82-101,
Krzysztof Pietrzak
,
Georg Fuchsbauer
,
Vanishree Rao
,
Momchil Konstantinov
bib info - Invited Talk: The Legal Infrastructure Around Information Security in Asia , Helaine Leggat
- Obfuscation
-
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
, 102-121,
Mihir Bellare
,
Stefano Tessaro
,
Igors Stepanovs
bib info -
Using Indistinguishability Obfuscation via UCEs
, 122-141,
Christina Brzuska
,
Arno Mittelbach
bib info -
Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input
, 142-161,
Christina Brzuska
,
Arno Mittelbach
bib info -
Bootstrapping Obfuscators via Fast Pseudorandom Functions
, 162-172,
Benny Applebaum
bib info - Homomorphic Cryptography
-
Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack
, 173-192,
Aaram Yun
,
Chihong Joo
bib info -
Authenticating Computation on Groups: New Homomorphic Primitives and Applications
, 193-212,
Dario Catalano
,
Antonio Marcedone
,
Orazio Puglisi
bib info -
Compact VSS and Efficient Homomorphic UC Commitments
, 213-232,
Ivan DamgÃÂ¥rd
,
Jesper Buus Nielsen
,
Irene Giacomelli
,
Bernardo Machado David
bib info - Secret Sharing
-
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
, 233-253,
Stanislaw Jarecki
,
Aggelos Kiayias
,
Hugo Krawczyk
bib info -
Secret-Sharing for NP
, 254-273,
Moni Naor
,
Ilan Komargodski
,
Eylon Yogev
bib info - Block Ciphers and Passwords
-
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
, 274-288,
Thomas Peyrin
,
Ivica Nikolic
,
Jérémy Jean
bib info -
Memory-Demanding Password Scrambling
, 289-305,
Stefan Lucks
,
Christian Forler
,
Jakob Wenzel
bib info - Side Channel Analysis II
-
Side-Channel Analysis of Multiplications in GF(2
128
) - Application to AES-GCM
, 306-325,
Pierre-Alain Fouque
,
Benoît Gérard
,
Sonia Belaïd
bib info -
Higher-Order Threshold Implementations
, 326-343,
Vincent Rijmen
,
Ventzislav Nikov
,
Svetla Nikova
,
Benedikt Gierlichs
,
Begül Bilgin
bib info -
Masks Will Fall Off - Higher-Order Optimal Distinguishers
, 344-365,
Sylvain Guilley
,
Annelie Heuser
,
Olivier Rioul
,
Nicolas Bruneau
bib info - Black-Box Separation
-
Black-Box Separations for One-More (Static) CDH and Its Generalization
, 366-385,
Jiang Zhang
,
Zhenfeng Zhang
,
Zongyang Zhang
,
Yu Chen
,
Yanfei Guo
bib info -
Black-Box Separations for Differentially Private Protocols
, 386-405,
Amit Sahai
,
Hemanta K. Maji
,
Dakshita Khurana
bib info - Composability
-
Composable Security of Delegated Quantum Computation
, 406-425,
Renato Renner
,
Joseph Fitzsimons
,
Vedran Dunjko
,
Christopher Portmann
bib info -
All-But-Many Encryption - A New Framework for Fully-Equipped UC Commitments
, 426-447,
Eiichiro Fujisaki
bib info - Multi-Party Computation
-
Multi-valued Byzantine Broadcast: The t < n Case
, 448-465,
Martin Hirt
,
Pavel Raykov
bib info -
Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation
, 466-485,
Yehuda Lindell
,
Ran Cohen
bib info -
Actively Secure Private Function Evaluation
, 486-505,
Payman Mohassel
,
Nigel P. Smart
,
Seyed Saeed Sadeghian
bib info -
Efficient, Oblivious Data Structures for MPC
, 506-525,
Marcel Keller
,
Peter Scholl
bib info