Book Volume 8043 2013

Advances in Cryptology – CRYPTO 2013

33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II


ISBN: 978-3-642-40083-4 (Print) 978-3-642-40084-1 (Online)

Table of contents (31 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Session 11: Implementation-Oriented Protocols

    1. Chapter

      Pages 1-17

      Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries

    2. Chapter

      Pages 18-35

      Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose

    3. Chapter

      Pages 36-53

      Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation

    4. Chapter

      Pages 54-70

      Improved OT Extension for Transferring Short Secrets

    5. Chapter

      Pages 71-89

      Time-Optimal Interactive Proofs for Circuit Evaluation

    6. Chapter

      Pages 90-108

      SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge

  3. Invited Talk: Why the Web Still Runs on RC4

    1. Session 12: Number-Theoretic Hardness

      1. Chapter

        Pages 109-128

        On the Function Field Sieve and the Impact of Higher Splitting Probabilities

      2. Chapter

        Pages 129-147

        An Algebraic Framework for Diffie-Hellman Assumptions

      3. Chapter

        Pages 148-165

        Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields

      Session 13: MPC — Foundations

      1. Chapter

        Pages 166-184

        Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys

      2. Chapter

        Pages 185-202

        Efficient Multiparty Protocols via Log-Depth Threshold Formulae

      3. Chapter

        Pages 203-219

        A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation

      4. Chapter

        Pages 220-238

        What Information Is Leaked under Concurrent Composition?

      Session 14: Codes and Secret Sharing

      1. Chapter

        Pages 239-257

        Non-malleable Codes from Two-Source Extractors

      2. Chapter

        Pages 258-276

        Optimal Coding for Streaming Authentication and Interactive Communication

      3. Chapter

        Pages 277-288

        Secret Sharing, Rank Inequalities and Information Inequalities

      Session 15: Signatures and Authentication

      1. Chapter

        Pages 289-307

        Linearly Homomorphic Structure-Preserving Signatures and Their Applications

      2. Chapter

        Pages 308-325

        Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs

      Session 16: Quantum Security

      1. Chapter

        Pages 326-343

        Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling

      2. Chapter

        Pages 344-360

        Quantum One-Time Programs

previous Page of 2