Book Volume 7417 2012

Advances in Cryptology – CRYPTO 2012

32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings


ISBN: 978-3-642-32008-8 (Print) 978-3-642-32009-5 (Online)

Table of contents (50 chapters)

previous Page of 3
  1. Front Matter

    Pages I-XV

  2. Chapter

    Pages 1-13

    An Enciphering Scheme Based on a Card Shuffle

  3. Chapter

    Pages 14-30

    Tweakable Blockciphers with Beyond Birthday-Bound Security

  4. Chapter

    Pages 31-49

    Breaking and Repairing GCM Security Proofs

  5. Chapter

    Pages 50-67

    On the Distribution of Linear Biases: Three Instructive Examples

  6. Chapter

    Pages 68-85

    Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs

  7. Chapter

    Pages 86-86

    The End of Crypto

  8. Chapter

    Pages 87-104

    Must You Know the Code of f to Securely Compute f?

  9. Chapter

    Pages 105-123

    Adaptively Secure Multi-Party Computation with Dishonest Majority

  10. Chapter

    Pages 124-143

    Collusion-Preserving Computation

  11. Chapter

    Pages 144-161

    Secret Sharing Schemes for Very Dense Graphs

  12. Chapter

    Pages 162-179

    Functional Encryption with Bounded Collusions via Multi-party Computation

  13. Chapter

    Pages 180-198

    New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques

  14. Chapter

    Pages 199-217

    Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption

  15. Chapter

    Pages 218-235

    Functional Encryption for Regular Languages

  16. Chapter

    Pages 236-254

    Secure Database Commitments and Universal Arguments of Quasi Knowledge

  17. Chapter

    Pages 255-272

    Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits

  18. Chapter

    Pages 273-293

    On the Security of TLS-DHE in the Standard Model

  19. Chapter

    Pages 294-311

    Semantic Security for the Wiretap Channel

  20. Chapter

    Pages 312-329

    Multi-instance Security and Its Application to Password-Based Cryptography

  21. Chapter

    Pages 330-347

    Hash Functions Based on Three Permutations: A Generic Security Analysis

previous Page of 3