## Books

books.google.ca - This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions....https://books.google.ca/books/about/Advances_in_Cryptology_ASIACRYPT_2009.html?id=jaBuCQAAQBAJ&utm_source=gb-gplus-shareAdvances in Cryptology - ASIACRYPT 2009 EBOOK FROM CA$43.73Get this book in print

# Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings

Mitsuri Matsui Springer, Dec. 1, 2009 - Computers - 722 pages 0 Reviewshttps://books.google.com/books/about/Advances_in_Cryptology_ASIACRYPT_2009.html?id=jaBuCQAAQBAJ This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels. Preview this book »### What people are saying - Write a review

We haven't found any reviews in the usual places.### Selected pages

Page 15

Page 14

Page 28

Page 26

Title Page

### Other editions - View all

Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on ...Mitsuri Matsui

Limited preview - 2009

### Common terms and phrases

adversary AES-NI algorithm applied ASIACRYPT assumption bits blind signature block cipher bound bytes ciphertext circuit client puzzle collision attack commitment scheme complexity compression function compute construction cryptanalysis CRYPTO cryptographic cryptosystem decryption defined definition denote difference differential distinguisher distribution efficient encryption scheme EUROCRYPT factor full version Game gates given hash function Heidelberg Heidelberg 2008 ideal implementation inbound phase IND-CPA input integer interaction iterations key-dependent lattice leakage Lemma linear LNCS message expansion min-entropy non-malleable notion oblivious transfer obtain one-way functions output pair parameter permutation plaintext polynomial preimage preimage attack primitive probability problem proof protocol prove public key PX,Y quadratic quantum queries random oracle model requires round S-box secret key Section signature scheme simulatable simulator Springer step SubBytes technique Theorem tion trapdoor vector verifier zero-knowledge zero-knowledge proof### Bibliographic information

Title Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings*Volume 5912 of Lecture Notes in Computer Science*

*Security and Cryptology*Editor Mitsuri Matsui Edition illustrated Publisher Springer, 2009 ISBN 3642103669, 9783642103667 Length 722 pages Subjects Computers › Security › General

Computers / Data Processing

Computers / Information Technology

Computers / Information Theory

Computers / Programming / Algorithms

Computers / Programming / General

Computers / Security / Cryptography

Computers / Security / General

Mathematics / Discrete Mathematics     Export Citation BiBTeX EndNote RefMan