Advances in Cryptology – CRYPTO 2013

33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II

  • Ran Canetti
  • Juan A. Garay
Conference proceedings

DOI: 10.1007/978-3-642-40084-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8043)

Table of contents (30 papers)

  1. Front Matter
  2. Session 11: Implementation-Oriented Protocols

    1. Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
      Yan Huang, Jonathan Katz, David Evans
      Pages 18-35
    2. Improved OT Extension for Transferring Short Secrets
      Vladimir Kolesnikov, Ranjit Kumaresan
      Pages 54-70
    3. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
      Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza
      Pages 90-108
  3. Invited Talk: Why the Web Still Runs on RC4

    1. Session 12: Number-Theoretic Hardness

      1. On the Function Field Sieve and the Impact of Higher Splitting Probabilities
        Faruk Göloğlu, Robert Granger, Gary McGuire, Jens Zumbrägel
        Pages 109-128
      2. An Algebraic Framework for Diffie-Hellman Assumptions
        Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Villar
        Pages 129-147
      3. Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
        Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III
        Pages 148-165
    2. Session 13: MPC — Foundations

      1. Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
        Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters
        Pages 166-184
      2. Efficient Multiparty Protocols via Log-Depth Threshold Formulae
        Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz et al.
        Pages 185-202
      3. What Information Is Leaked under Concurrent Composition?
        Vipul Goyal, Divya Gupta, Abhishek Jain
        Pages 220-238
    3. Session 14: Codes and Secret Sharing

      1. Non-malleable Codes from Two-Source Extractors
        Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
        Pages 239-257
      2. Optimal Coding for Streaming Authentication and Interactive Communication
        Matthew Franklin, Ran Gelles, Rafail Ostrovsky, Leonard J. Schulman
        Pages 258-276
      3. Secret Sharing, Rank Inequalities and Information Inequalities
        Sebastià Martín, Carles Padró, An Yang
        Pages 277-288
    4. Session 15: Signatures and Authentication

      1. Linearly Homomorphic Structure-Preserving Signatures and Their Applications
        Benoît Libert, Thomas Peters, Marc Joye, Moti Yung
        Pages 289-307
      2. Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
        Vadim Lyubashevsky, Daniel Masny
        Pages 308-325
    5. Session 16: Quantum Security

      1. Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling
        Frédéric Dupuis, Omar Fawzi, Stephanie Wehner
        Pages 326-343

About these proceedings


The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.


Diffie-Hellman key exchange homomorphic encryption multi-party computation security protocols side-channel attacks

Editors and affiliations

  • Ran Canetti
    • 1
  • Juan A. Garay
    • 2
  1. 1.Boston University and Tel Aviv UniversityBostonUSA
  2. 2.AT&T Labs – ResearchFlorham ParkUSA

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2013 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-40083-4
  • Online ISBN 978-3-642-40084-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349