## Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, ProceedingsThis book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Other editions - View all

### Common terms and phrases

adversary AES-NI algorithm applied ASIACRYPT assumption bits blind signature block cipher bound bytes ciphertext circuit client puzzle collision attack commitment scheme complexity compression function compute construction cryptanalysis CRYPTO cryptographic cryptosystem decryption defined definition denote difference differential distinguisher distribution efficient encryption scheme EUROCRYPT factor full version Game gates given hash function Heidelberg Heidelberg 2008 ideal implementation inbound phase IND-CPA input integer interaction iterations key-dependent lattice leakage Lemma linear LNCS message expansion min-entropy non-malleable notion oblivious transfer obtain one-way functions output pair parameter permutation plaintext polynomial preimage preimage attack primitive probability problem proof protocol prove public key PX,Y quadratic quantum queries random oracle model requires round S-box secret key Section signature scheme simulatable simulator Springer step SubBytes technique Theorem tion trapdoor vector verifier zero-knowledge zero-knowledge proof