Advances in Cryptology – CRYPTO 2008

28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings

  • Editors
  • David Wagner
Conference proceedings CRYPTO 2008

DOI: 10.1007/978-3-540-85174-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5157)

Table of contents (32 papers)

  1. Front Matter
  2. Random Oracles

    1. The Random Oracle Model and the Ideal Cipher Model Are Equivalent
      Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin
      Pages 1-20
    2. Programmable Hash Functions and Their Applications
      Dennis Hofheinz, Eike Kiltz
      Pages 21-38
  3. Applications

    1. One-Time Programs
      Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum
      Pages 39-56
    2. Adaptive One-Way Functions and Applications
      Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan
      Pages 57-74
  4. Public-Key Crypto I

    1. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys
      Dimitar Jetchev, Ramarathnam Venkatesan
      Pages 75-92
    2. Improved Bounds on Security Reductions for Discrete Log Based Signatures
      Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam
      Pages 93-107
    3. Circular-Secure Encryption from Decision Diffie-Hellman
      Dan Boneh, Shai Halevi, Mike Hamburg, Rafail Ostrovsky
      Pages 108-125
    4. Public-Key Locally-Decodable Codes
      Brett Hemenway, Rafail Ostrovsky
      Pages 126-143
  5. Hash Functions I

    1. Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
      Helena Handschuh, Bart Preneel
      Pages 144-161
    2. Cryptanalysis of the GOST Hash Function
      Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt
      Pages 162-178
    3. Preimages for Reduced SHA-0 and SHA-1
      Christophe De Cannière, Christian Rechberger
      Pages 179-202
  6. Cryptanalysis I

    1. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
      Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
      Pages 203-220
    2. Bug Attacks
      Eli Biham, Yaniv Carmeli, Adi Shamir
      Pages 221-240
  7. Multiparty Computation I

    1. Scalable Multiparty Computation with Nearly Optimal Work and Resilience
      Ivan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam Smith
      Pages 241-261
  8. Cryptanalysis II

    1. Cryptanalysis of MinRank
      Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret
      Pages 280-296
    2. New State Recovery Attack on RC4
      Alexander Maximov, Dmitry Khovratovich
      Pages 297-316
  9. Public-Key Crypto II

    1. Dynamic Threshold Public-Key Encryption
      Cécile Delerablée, David Pointcheval
      Pages 317-334

About these proceedings


This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008.

The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on random oracles, applications, public-key crypto, hash functions, cryptanalysis, multiparty computation, privacy, zero knowledge, and oblivious transfer.


algebraic geometry algorithms authentication broadcast encryption calculus collision resistance communication communication complexity complexity complexity analysis cryptographic protocols cryptography data encryption privacy security

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85173-8
  • Online ISBN 978-3-540-85174-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349