Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. ProceedingsMasayuki Abe Annotation. This book constitutes the refereed proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2010, held in Singapore, in December 2010. The 35 revised full papers presented were carefully reviewed and selected from 216 submissions. The papers are organized in topical sections on hash attacks; symmetric-key cryptosystems; block and stream ciphers; protocols; key exchange; foundation; zero-knowledge; lattice-based cryptography; secure communication and computation; models, notions, and assumptions; and public-key encryption. |
Other editions - View all
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on ... Masayuki Abe No preview available - 2010 |
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on ... Masayuki Abe No preview available - 2010 |
Common terms and phrases
adversary algorithm analysis ASIACRYPT assumption BigWord bilinear bits black-box blind signature block bound bytes cipher ciphertext circuit client collision commitment scheme common reference string complexity compression function compute construction CRYPTO cryptographic Cryptology cryptosystem decryption defined degree denote Diffie-Hellman distinguisher efficient encryption scheme equation EUROCRYPT full version given graph Gröbner basis group elements hash function Heidelberg Heidelberg 2009 homomorphic homomorphic encryption IND-CCA input integer lattice leakage resilience Lemma linear LNCS NIZK argument NIZK proofs non-interactive one-way function output pair permutation phase plaintext polynomial preimage attack probability problem protocol prove public key queries random oracle reduction requires rounds S-box satisfy secret key Section security parameter semi-generic server sharing side-channel attacks signature scheme simulator solving Springer subkey Super-Sbox Theorem tion trapdoor trapdoor permutation values variables vector verifier zero-knowledge