Advances in Cryptology – EUROCRYPT 2013

32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings

  • Thomas Johansson
  • Phong Q. Nguyen
Conference proceedings EUROCRYPT 2013

DOI: 10.1007/978-3-642-38348-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7881)

Table of contents (42 papers)

  1. Front Matter
  2. Candidate Multilinear Maps from Ideal Lattices
    Sanjam Garg, Craig Gentry, Shai Halevi
    Pages 1-17
  3. Lossy Codes and a New Variant of the Learning-With-Errors Problem
    Nico Döttling, Jörn Müller-Quade
    Pages 18-34
  4. A Toolkit for Ring-LWE Cryptography
    Vadim Lyubashevsky, Chris Peikert, Oded Regev
    Pages 35-54
  5. Regularity of Lossy RSA on Subdomains and Its Applications
    Mark Lewko, Adam O’Neill, Adam Smith
    Pages 55-75
  6. Efficient Cryptosystems from 2k-th Power Residue Symbols
    Marc Joye, Benoît Libert
    Pages 76-92
  7. Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
    Ananth Raghunathan, Gil Segev, Salil Vadhan
    Pages 93-110
  8. How to Watermark Cryptographic Functions
    Ryo Nishimaki
    Pages 111-125
  9. Security Evaluations beyond Computing Power
    Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
    Pages 126-141
  10. Masking against Side-Channel Attacks: A Formal Security Proof
    Emmanuel Prouff, Matthieu Rivain
    Pages 142-159
  11. Leakage-Resilient Cryptography from Minimal Assumptions
    Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs
    Pages 160-176
  12. Fast Cryptography in Genus 2
    Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
    Pages 194-210
  13. Graph-Theoretic Algorithms for the “Isomorphism of Polynomials” Problem
    Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber
    Pages 211-227
  14. Cryptanalysis of Full RIPEMD-128
    Franck Landelle, Thomas Peyrin
    Pages 228-244
  15. Improving Local Collisions: New Attacks on Reduced SHA-256
    Florian Mendel, Tomislav Nad, Martin Schläffer
    Pages 262-278
  16. Dynamic Proofs of Retrievability via Oblivious RAM
    David Cash, Alptekin Küpçü, Daniel Wichs
    Pages 279-295
  17. Message-Locked Encryption and Secure Deduplication
    Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
    Pages 296-312
  18. Keccak
    Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
    Pages 313-314

About these proceedings


This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.


RAM programs RSA ciphertexts fully homomorphic encryption multiparty computation

Editors and affiliations

  • Thomas Johansson
    • 1
  • Phong Q. Nguyen
    • 2
  1. 1.Dept. of Electrical and Information TechnologyLund UniversityLundSweden
  2. 2.Départment d’informatiqueEcole normale supérieureParis Cedex 05France

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38347-2
  • Online ISBN 978-3-642-38348-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349