Advances in Cryptology – CRYPTO 2012

32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings

Editors:

ISBN: 978-3-642-32008-8 (Print) 978-3-642-32009-5 (Online)

Table of contents (50 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-13

    An Enciphering Scheme Based on a Card Shuffle

  3. No Access

    Book Chapter

    Pages 14-30

    Tweakable Blockciphers with Beyond Birthday-Bound Security

  4. No Access

    Book Chapter

    Pages 31-49

    Breaking and Repairing GCM Security Proofs

  5. No Access

    Book Chapter

    Pages 50-67

    On the Distribution of Linear Biases: Three Instructive Examples

  6. No Access

    Book Chapter

    Pages 68-85

    Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs

  7. No Access

    Book Chapter

    Pages 86-86

    The End of Crypto

  8. No Access

    Book Chapter

    Pages 87-104

    Must You Know the Code of f to Securely Compute f?

  9. No Access

    Book Chapter

    Pages 105-123

    Adaptively Secure Multi-Party Computation with Dishonest Majority

  10. No Access

    Book Chapter

    Pages 124-143

    Collusion-Preserving Computation

  11. No Access

    Book Chapter

    Pages 144-161

    Secret Sharing Schemes for Very Dense Graphs

  12. No Access

    Book Chapter

    Pages 162-179

    Functional Encryption with Bounded Collusions via Multi-party Computation

  13. No Access

    Book Chapter

    Pages 180-198

    New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques

  14. No Access

    Book Chapter

    Pages 199-217

    Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption

  15. No Access

    Book Chapter

    Pages 218-235

    Functional Encryption for Regular Languages

  16. No Access

    Book Chapter

    Pages 236-254

    Secure Database Commitments and Universal Arguments of Quasi Knowledge

  17. No Access

    Book Chapter

    Pages 255-272

    Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits

  18. No Access

    Book Chapter

    Pages 273-293

    On the Security of TLS-DHE in the Standard Model

  19. No Access

    Book Chapter

    Pages 294-311

    Semantic Security for the Wiretap Channel

  20. No Access

    Book Chapter

    Pages 312-329

    Multi-instance Security and Its Application to Password-Based Cryptography

  21. No Access

    Book Chapter

    Pages 330-347

    Hash Functions Based on Three Permutations: A Generic Security Analysis

previous Page of 3