Limit search to available items
Record 21 of 108
Previous Record Next Record
Book Cover
E-book
Author CRYPTO (Conference) (33rd : 2013 : Santa Barbara, Calif.), author.

Title Advances in cryptology : CRYPTO 2013 : 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013, proceedings, Part I / Ran Canetti, Juan A. Garay (eds.)
Published Heidelberg : Springer, [2013]
©2013

Copies

Description 1 online resource (xvii, 590 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 8042
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8042.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Session 1: Lattices and FHE. Practical Bootstrapping in Quasilinear Time / Jacob Alperin-Sheriff, Chris Peikert -- Hardness of SIS and LWE with Small Parameters / Daniele Micciancio, Chris Peikert -- Lattice Signatures and Bimodal Gaussians / Léo Ducas ... et al. -- Learning with Rounding, Revisited / Joël Alwen ... et al. -- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / Craig Gentry, Amit Sahai, Brent Waters -- Invited Talk: Crypto Wars Part 2 Have Begun
Session 2: Foundations of Hardness. A Uniform Min-Max Theorem with Applications in Cryptography / Salil Vadhan, Colin Jia Zheng -- Limits of Provable Security for Homomorphic Encryption / Andrej Bogdanov, Chin Ho Lee
Session 3: Cryptanalysis I. Counter-Cryptanalysis / Marc Stevens -- Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System / Daehyun Strobel ... et al. -- Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking / Bin Zhang, Chao Xu, Dengguo Feng
Session 4: Cryptanalysis II. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 / Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin -- Bounds in Shallows and in Miseries / Céline Blondeau, Andrey Bogdanov, Gregor Leander -- Sieve-in-the-Middle: Improved MITM Attacks / Anne Canteaut, María Naya-Plasencia, Bastien Vayssière -- Construction of Differential Characteristics in ARX Designs Application to Skein / Gaëtan Leurent
Session 5: MPC -- New Directions. On Fair Exchange, Fair Coins and Fair Sampling / Shashank Agrawal, Manoj Prabhakaran -- Limits on the Power of Cryptographic Cheap Talk / Pavel Hubáček, Jesper Buus Nielsen, Alon Rosen -- Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols / Vipul Goyal ... et al
Session 6: Leakage Resilience. Secure Computation against Adaptive Auxiliary Information / Elette Boyle ... et al. -- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions / François-Xavier Standaert, Olivier Pereira, Yu Yu
Session 7: Symmetric Encryption and PRFs. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries / David Cash ... et al. -- Message-Locked Encryption for Lock-Dependent Messages / Martín Abadi ... et al. -- The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries / Thomas Ristenpart, Scott Yilek -- Key Homomorphic PRFs and Their Applications / Dan Boneh ... et al
Session 8: Key Exchange. On the Security of the TLS Protocol: A Systematic Analysis / Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee -- New Techniques for SPHFs and Efficient One-Round PAKE Protocols / Fabrice Benhamouda ... et al.-- Session 9: Multi Linear Maps. Practical Multilinear Maps over the Integers / Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi -- Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures / Susan Hohenberger, Amit Sahai, Brent Waters -- Programmable Hash Functions in the Multilinear Setting / Eduarda S.V. Freire ... et al
Session 10: Ideal Ciphers. On the Indifferentiability of Key-Alternating Ciphers / Elena Andreeva ... et al. -- Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers / Peter Gaži -- Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions / Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy
Summary The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption
Bibliography Includes bibliographical references and author index
Notes Print version record
Subject Computers -- Access control -- Congresses
Computer security -- Congresses
Cryptography -- Congresses
Computer security.
Computer Security
Computer security
Computers -- Access control
Cryptography
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Canetti, Ran, editor
Garay, Juan A., editor
International Association for Cryptologic Research, sponsoring body.
ISBN 9783642400414
3642400418