Description |
1 online resource (xvii, 590 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 8042 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8042.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Session 1: Lattices and FHE. Practical Bootstrapping in Quasilinear Time / Jacob Alperin-Sheriff, Chris Peikert -- Hardness of SIS and LWE with Small Parameters / Daniele Micciancio, Chris Peikert -- Lattice Signatures and Bimodal Gaussians / Léo Ducas ... et al. -- Learning with Rounding, Revisited / Joël Alwen ... et al. -- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / Craig Gentry, Amit Sahai, Brent Waters -- Invited Talk: Crypto Wars Part 2 Have Begun |
|
Session 2: Foundations of Hardness. A Uniform Min-Max Theorem with Applications in Cryptography / Salil Vadhan, Colin Jia Zheng -- Limits of Provable Security for Homomorphic Encryption / Andrej Bogdanov, Chin Ho Lee |
|
Session 3: Cryptanalysis I. Counter-Cryptanalysis / Marc Stevens -- Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System / Daehyun Strobel ... et al. -- Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking / Bin Zhang, Chao Xu, Dengguo Feng |
|
Session 4: Cryptanalysis II. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 / Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin -- Bounds in Shallows and in Miseries / Céline Blondeau, Andrey Bogdanov, Gregor Leander -- Sieve-in-the-Middle: Improved MITM Attacks / Anne Canteaut, María Naya-Plasencia, Bastien Vayssière -- Construction of Differential Characteristics in ARX Designs Application to Skein / Gaëtan Leurent |
|
Session 5: MPC -- New Directions. On Fair Exchange, Fair Coins and Fair Sampling / Shashank Agrawal, Manoj Prabhakaran -- Limits on the Power of Cryptographic Cheap Talk / Pavel Hubáček, Jesper Buus Nielsen, Alon Rosen -- Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols / Vipul Goyal ... et al |
|
Session 6: Leakage Resilience. Secure Computation against Adaptive Auxiliary Information / Elette Boyle ... et al. -- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions / François-Xavier Standaert, Olivier Pereira, Yu Yu |
|
Session 7: Symmetric Encryption and PRFs. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries / David Cash ... et al. -- Message-Locked Encryption for Lock-Dependent Messages / Martín Abadi ... et al. -- The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries / Thomas Ristenpart, Scott Yilek -- Key Homomorphic PRFs and Their Applications / Dan Boneh ... et al |
|
Session 8: Key Exchange. On the Security of the TLS Protocol: A Systematic Analysis / Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee -- New Techniques for SPHFs and Efficient One-Round PAKE Protocols / Fabrice Benhamouda ... et al.-- Session 9: Multi Linear Maps. Practical Multilinear Maps over the Integers / Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi -- Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures / Susan Hohenberger, Amit Sahai, Brent Waters -- Programmable Hash Functions in the Multilinear Setting / Eduarda S.V. Freire ... et al |
|
Session 10: Ideal Ciphers. On the Indifferentiability of Key-Alternating Ciphers / Elena Andreeva ... et al. -- Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers / Peter Gaži -- Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions / Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy |
Summary |
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption |
Bibliography |
Includes bibliographical references and author index |
Notes |
Print version record |
Subject |
Computers -- Access control -- Congresses
|
|
Computer security -- Congresses
|
|
Cryptography -- Congresses
|
|
Computer security.
|
|
Computer Security
|
|
Computer security
|
|
Computers -- Access control
|
|
Cryptography
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Canetti, Ran, editor
|
|
Garay, Juan A., editor
|
|
International Association for Cryptologic Research, sponsoring body.
|
ISBN |
9783642400414 |
|
3642400418 |
|