Advances in Cryptology – CRYPTO 2013

33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I

  • Ran Canetti
  • Juan A. Garay
Conference proceedings

DOI: 10.1007/978-3-642-40041-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8042)

Table of contents (31 papers)

  1. Front Matter
  2. Session 1: Lattices and FHE

    1. Practical Bootstrapping in Quasilinear Time
      Jacob Alperin-Sheriff, Chris Peikert
      Pages 1-20
    2. Hardness of SIS and LWE with Small Parameters
      Daniele Micciancio, Chris Peikert
      Pages 21-39
    3. Lattice Signatures and Bimodal Gaussians
      Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky
      Pages 40-56
    4. Learning with Rounding, Revisited
      Joël Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs
      Pages 57-74
  3. Invited Talk: Crypto Wars Part 2 Have Begun

    1. Session 2: Foundations of Hardness

      1. A Uniform Min-Max Theorem with Applications in Cryptography
        Salil Vadhan, Colin Jia Zheng
        Pages 93-110
      2. Limits of Provable Security for Homomorphic Encryption
        Andrej Bogdanov, Chin Ho Lee
        Pages 111-128
    2. Session 3: Cryptanalysis I

      1. Counter-Cryptanalysis
        Marc Stevens
        Pages 129-146
      2. Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
        Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg et al.
        Pages 147-164
      3. Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking
        Bin Zhang, Chao Xu, Dengguo Feng
        Pages 165-182
    3. Session 4: Cryptanalysis II

      1. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
        Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin
        Pages 183-203
      2. Bounds in Shallows and in Miseries
        Céline Blondeau, Andrey Bogdanov, Gregor Leander
        Pages 204-221
      3. Sieve-in-the-Middle: Improved MITM Attacks
        Anne Canteaut, María Naya-Plasencia, Bastien Vayssière
        Pages 222-240
    4. Session 5: MPC – New Directions

      1. On Fair Exchange, Fair Coins and Fair Sampling
        Shashank Agrawal, Manoj Prabhakaran
        Pages 259-276
      2. Limits on the Power of Cryptographic Cheap Talk
        Pavel Hubáček, Jesper Buus Nielsen, Alon Rosen
        Pages 277-297
      3. Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols
        Vipul Goyal, Ilya Mironov, Omkant Pandey, Amit Sahai
        Pages 298-315
    5. Session 6: Leakage Resilience

      1. Secure Computation against Adaptive Auxiliary Information
        Elette Boyle, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Amit Sahai
        Pages 316-334
      2. Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
        François-Xavier Standaert, Olivier Pereira, Yu Yu
        Pages 335-352

About these proceedings

Introduction

The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.

Keywords

Diffie-Hellman key exchange homomorphic encryption multi-party computation security protocols side-channel attacks

Editors and affiliations

  • Ran Canetti
    • 1
  • Juan A. Garay
    • 2
  1. 1.Boston University and Tel Aviv UniversityBostonUSA
  2. 2.AT&T Labs – ResearchFlorham ParkUSA

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2013 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-40040-7
  • Online ISBN 978-3-642-40041-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349