This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels.3.1 The Attack Fix an {(Fn , An)} that can be q-covered, and let PE = (Setup, KeyGen, Enc, Dec) be a predicate encryption scheme over ... given access to a PSPACE-complete oracle (or if P = NP) and this suffices to prove black- box impossibility as in previous work [12, 17, 5]. ... For i = 1 to p, adversary A does the following: 1.

Title | : | Advances in Cryptology - ASIACRYPT 2009 |

Author | : | Mitsuri Matsui |

Publisher | : | Springer Science & Business Media - 2009-11-17 |

Continue