Advertisement

Advances in Cryptology – EUROCRYPT 2017

36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I

  • Jean-Sébastien Coron
  • Jesper Buus Nielsen

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10210)

Also part of the Security and Cryptology book sub series (LNSC, volume 10210)

Table of contents

  1. Front Matter
    Pages I-XXIII
  2. Lattice Attacks and Constructions I

    1. Front Matter
      Pages 1-1
    2. Paul Kirchner, Pierre-Alain Fouque
      Pages 3-26
    3. Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
      Pages 27-59
    4. Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
      Pages 60-88
  3. Obfuscation and Functional Encryption

  4. Discrete Logarithm

    1. Front Matter
      Pages 183-183
    2. Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke
      Pages 185-201
    3. Joshua Fried, Pierrick Gaudry, Nadia Heninger, Emmanuel Thomé
      Pages 202-231
  5. Multiparty Computation I

    1. Front Matter
      Pages 233-233
    2. Peter Rindal, Mike Rosulek
      Pages 235-259
    3. Rafael Pass, Elaine Shi, Florian Tramèr
      Pages 260-289
  6. Lattice Attacks and Constructions II

    1. Front Matter
      Pages 291-291
    2. Vadim Lyubashevsky, Gregory Neven
      Pages 293-323
    3. Ronald Cramer, Léo Ducas, Benjamin Wesolowski
      Pages 324-348
  7. Universal Composability

    1. Front Matter
      Pages 349-349
    2. Brandon Broadnax, Nico Döttling, Gunnar Hartung, Jörn Müller-Quade, Matthias Nagel
      Pages 351-381
    3. Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky, Ivan Visconti
      Pages 382-411
  8. Lattice Attacks and Constructions III

    1. Front Matter
      Pages 413-413
    2. Dan Boneh, Sam Kim, Hart Montgomery
      Pages 415-445
    3. Ran Canetti, Yilei Chen
      Pages 446-476
  9. Zero Knowledge I

    1. Front Matter
      Pages 477-477
    2. Ronald Cramer, Ivan Damgård, Chaoping Xing, Chen Yuan
      Pages 479-500
    3. Payman Mohassel, Mike Rosulek, Alessandra Scafuro
      Pages 501-531
  10. Side-Channel Attacks and Countermeasures

    1. Front Matter
      Pages 533-533
    2. Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
      Pages 535-566
    3. Dahmun Goudarzi, Matthieu Rivain
      Pages 567-597
  11. Functional Encryption I

    1. Front Matter
      Pages 599-599
    2. Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee
      Pages 601-626
    3. Shashank Agrawal, Melissa Chase
      Pages 627-656
  12. Elliptic Curves

    1. Front Matter
      Pages 657-657
    2. Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik
      Pages 679-706
  13. Back Matter
    Pages 707-709

Other volumes

  1. Advances in Cryptology – EUROCRYPT 2017
    36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I
  2. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II
  3. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III

About these proceedings

Introduction

The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.

The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.

Keywords

cryptanalysis cryptography multi-user security post-quantum cryptography security models algorithms electronic signatures elliptic-curves hash function homomorphic encryption lattices memory-hard functions mixed integer linear programming multi-party computation password hashing public-key encryption quantum security side-channel attacks symmetric cryptography symmetric-key encryption

Editors and affiliations

  • Jean-Sébastien Coron
    • 1
  • Jesper Buus Nielsen
    • 2
  1. 1.University of LuxembourgLuxembourgLuxembourg
  2. 2.Aarhus UniversityAarhusDenmark

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-56620-7
  • Copyright Information International Association for Cryptologic Research 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-56619-1
  • Online ISBN 978-3-319-56620-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site