Limit search to available items
Record 16 of 269
Previous Record Next Record
Book Cover
E-book
Author CRYPTO (Conference) (37th : 2017 : Santa Barbara, Calif.)

Title Advances in cryptology -- CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings. Part III / Jonathan Katz, Hovav Shacham (eds.)
Published Cham, Switzerland : Springer, 2017

Copies

Description 1 online resource (xv, 713 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 10403
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 10403. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; Preface; Crypto 2017 The 37th IACR International Cryptology Conference; Contents -- Part III; Authenticated Encryption; Boosting Authenticated Encryption Robustness with Minimal Modifications; 1 Introduction; 1.1 Robust Algorithms; 1.2 Release of Unverified Plaintext; 1.3 Contributions; 2 Related Work; 3 Preliminaries; 3.1 Notation; 3.2 Adversaries and Advantages; 3.3 Authenticated Encryption Schemes; 4 Resilience to Nonce Misuse; 4.1 OCB Attacks; 4.2 Chosen-Plaintext Confidentiality; 4.3 Authenticity; 4.4 Chosen-Ciphertext Confidentiality; 5 Adding RUP Security to Encryption Schemes
5.1 Definitions5.2 Generic Construction; 5.3 GCM-RUP; A Algorithm Descriptions; A.1 OCB; A.2 GCM; A.3 ChaCha20+Poly1305; B Formal Security Argument For The Generic Construction; C Application to Tor; C.1 Tor; C.2 The Crypto-tagging Attack; C.3 Avoiding the Attack; References; ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication; 1 Introduction; 2 Preliminaries; 3 Specification of ZMAC; 3.1 Overview; 3.2 Specification of ZHASH for the Case t N; 3.3 Specification of ZHASH for the Case t> n; 3.4 Finalization; 4 The PRF Security of ZMAC; 4.1 XT Tweak Extension
4.2 Collision Probability of ZHASH4.3 PRF Security of Finalization; 4.4 PRF Security of ZMAC; 4.5 Other Variants of ZMAC; 5 Application to Authenticated Encryption: ZAE; 6 MAC and AE Instances; 6.1 Handling the Domain Separation of TBC Instances; 6.2 Efficiency Comparisons; References; Message Franking via Committing Authenticated Encryption; 1 Introduction; 2 Preliminaries; 3 Message Franking and End-to-End Encryption; 4 Committing AEAD; 5 Are Existing AEAD Schemes Committing?; 5.1 Committing Encode-then-Encipher; 5.2 Encrypt-then-MAC; 5.3 MAC-then-Encrypt; 5.4 Some Non-binding AEAD Schemes
6 Composing Commitment and AEAD7 Nonce-Based Committing AEAD and the CEP Construction; 8 Analysis of CEP; 9 Related Work; References; Key Rotation for Authenticated Encryption; 1 Introduction; 2 Updatable AE; 3 Confidentiality and Integrity for Updatable Encryption; 3.1 Message Confidentiality; 3.2 Ciphertext Integrity; 4 Practical Updatable AE Schemes; 4.1 Authenticated Encryption; 4.2 (In- )Security of AE-Hybrid Construction; 4.3 Improving AE-Hybrid; 5 Indistinguishability of Re-encryptions; 6 Revisiting the BLMR Scheme; 6.1 Negative Result About Provable UP-IND Security of BLMR
7 An Updatable AE Scheme with Re-encryption Indistinguishability7.1 Security of ReCrypt; 7.2 Instantiating the Key-Homomorphic PRF; 7.3 Implementation and Performance; 8 Conclusion and Open Problems; A Bidirectional Updatable AE; A.1 XOR-KEM: A Bidirectional Updatable AE Scheme; References; Public-Key Encryption; Kurosawa-Desmedt Meets Tight Security; 1 Introduction; 2 Preliminaries; 2.1 Notations; 2.2 Hash Functions; 2.3 Prime-Order Groups; 2.4 Public-Key Encryption; 2.5 Key Encapsulation Mechanism; 3 Qualified Proof Systems; 4 The OR-Proof; 4.1 Public Parameters and the OR-Languages
Summary The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed August 17, 2017)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Network hardware.
Computer security.
Coding theory & cryptology.
Ethical & social aspects of IT.
Software Engineering.
Computers -- Hardware -- Network Hardware.
Computers -- Security -- General.
Computers -- Information Theory.
Computers -- Social Aspects -- General.
Computers -- Software Development & Engineering -- General.
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Katz, Jonathan, 1974- editor.
Shacham, Hovav, editor.
ISBN 9783319636979
3319636979
3319636960
9783319636962
Other Titles CRYPTO 2017