Advances in Cryptology – CRYPTO 2013

33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I

Editors:

ISBN: 978-3-642-40040-7 (Print) 978-3-642-40041-4 (Online)

Table of contents (31 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Session 1: Lattices and FHE

    1. No Access

      Book Chapter

      Pages 1-20

      Practical Bootstrapping in Quasilinear Time

    2. No Access

      Book Chapter

      Pages 21-39

      Hardness of SIS and LWE with Small Parameters

    3. No Access

      Book Chapter

      Pages 40-56

      Lattice Signatures and Bimodal Gaussians

    4. No Access

      Book Chapter

      Pages 57-74

      Learning with Rounding, Revisited

    5. No Access

      Book Chapter

      Pages 75-92

      Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based

  3. Invited Talk: Crypto Wars Part 2 Have Begun

    1. Session 5: MPC – New Directions

      1. No Access

        Book Chapter

        Pages 259-276

        On Fair Exchange, Fair Coins and Fair Sampling

      2. No Access

        Book Chapter

        Pages 277-297

        Limits on the Power of Cryptographic Cheap Talk

      3. No Access

        Book Chapter

        Pages 298-315

        Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols

      Session 6: Leakage Resilience

      1. No Access

        Book Chapter

        Pages 316-334

        Secure Computation against Adaptive Auxiliary Information

      2. No Access

        Book Chapter

        Pages 335-352

        Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions

      Session 7: Symmetric Encryption and PRFs

      1. No Access

        Book Chapter

        Pages 353-373

        Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries

      Session 2: Foundations of Hardness

      1. No Access

        Book Chapter

        Pages 93-110

        A Uniform Min-Max Theorem with Applications in Cryptography

      2. No Access

        Book Chapter

        Pages 111-128

        Limits of Provable Security for Homomorphic Encryption

      Session 3: Cryptanalysis I

      1. No Access

        Book Chapter

        Pages 129-146

        Counter-Cryptanalysis

      2. No Access

        Book Chapter

        Pages 147-164

        Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System

      3. No Access

        Book Chapter

        Pages 165-182

        Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking

      Session 4: Cryptanalysis II

      1. No Access

        Book Chapter

        Pages 183-203

        Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128

      2. No Access

        Book Chapter

        Pages 204-221

        Bounds in Shallows and in Miseries

      3. No Access

        Book Chapter

        Pages 222-240

        Sieve-in-the-Middle: Improved MITM Attacks

      4. No Access

        Book Chapter

        Pages 241-258

        Construction of Differential Characteristics in ARX Designs Application to Skein

previous Page of 2