LEADER 04712nam 2200625Ia 450 001 9910484643303321 005 20200520144314.0 010 $a1-280-39053-0 010 $a9786613568458 010 $a3-642-17373-X 024 7 $a10.1007/978-3-642-17373-8 035 $a(CKB)2670000000064703 035 $a(SSID)ssj0000475829 035 $a(PQKBManifestationID)11337489 035 $a(PQKBTitleCode)TC0000475829 035 $a(PQKBWorkID)10469883 035 $a(PQKB)10283625 035 $a(DE-He213)978-3-642-17373-8 035 $a(MiAaPQ)EBC3066196 035 $a(PPN)149893671 035 $a(EXLCZ)992670000000064703 100 $a20110103d2010 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in cryptology--ASIACRYPT 2010 $e16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010 : proceedings /$fMasayuki Abe (ed.) 205 $a1st ed. 2010. 210 $aBerlin $cSpringer$d2010 215 $a1 online resource (XIV, 634 p. 70 illus.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v6477 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 300 $a"International Association for Cryptologic Research". 311 $a3-642-17372-1 320 $aIncludes bibliographical references and index. 327 $aHash Attacks -- Rotational Rebound Attacks on Reduced Skein -- Finding Second Preimages of Short Messages for Hamsi-256 -- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl -- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 -- Collision Attacks against the Knudsen-Preneel Compression Functions -- Symmetric-Key Cryptosystems -- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions -- The World Is Not Enough: Another Look on Second-Order DPA -- Block and Stream Ciphers -- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems -- A Byte-Based Guess and Determine Attack on SOSEMANUK -- Improved Single-Key Attacks on 8-Round AES-192 and AES-256 -- Protocols -- Constant-Size Commitments to Polynomials and Their Applications -- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries -- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model -- Key Exchange -- Generic Compilers for Authenticated Key Exchange -- A Forward-Secure Symmetric-Key Derivation Protocol -- Foundation -- Efficient String-Commitment from Weak Bit-Commitment -- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields -- Random Oracles with(out) Programmability -- Zero-Knowledge -- Short Pairing-Based Non-interactive Zero-Knowledge Arguments -- Short Non-interactive Zero-Knowledge Proofs -- Optimistic Concurrent Zero Knowledge -- Lattice-Based Cryptography -- Faster Fully Homomorphic Encryption -- A Group Signature Scheme from Lattice Assumptions -- Lattice-Based Blind Signatures -- Secure Communication and Computation -- The Round Complexity of Verifiable Secret Sharing: The Statistical Case -- General Perfectly Secure Message Transmission Using Linear Codes -- On Invertible Sampling and Adaptive Security -- Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition -- Models, Notions, and Assumptions -- A Closer Look at Anonymity and Robustness in Encryption Schemes -- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures -- The Semi-Generic Group Model and Applications to Pairing-Based Cryptography -- Public-Key Encryption -- The Degree of Regularity of HFE Systems -- Structured Encryption and Controlled Disclosure -- Leakage Resilient ElGamal Encryption -- Efficient Public-Key Cryptography in the Presence of Key Leakage. 410 0$aLecture notes in computer science ;$v6477. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 517 3 $aASIACRYPT 2010 606 $aComputer security$vCongresses 606 $aCryptography$vCongresses 615 0$aComputer security 615 0$aCryptography 676 $a005.82 701 $aAbe$b Masayuki$0983603 712 02$aInternational Association for Cryptologic Research. 712 12$aInternational Conference on the Theory and Application of Cryptology and Information Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484643303321 996 $aAdvances in cryptology--ASIACRYPT 2010$94187263 997 $aUNINA