Advertisement

Advances in Cryptology – CRYPTO 2018

38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II

  • Hovav Shacham
  • Alexandra Boldyreva
Conference proceedings CRYPTO 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10992)

Also part of the Security and Cryptology book sub series (LNSC, volume 10992)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Proof Tools

    1. Front Matter
      Pages 1-1
    2. Phillip Rogaway, Yusi Zhang
      Pages 3-32
    3. Georg Fuchsbauer, Eike Kiltz, Julian Loss
      Pages 33-62
  3. Key Exchange

    1. Front Matter
      Pages 63-63
    2. Julia Hesse, Dennis Hofheinz, Lisa Kohl
      Pages 65-94
  4. Symmetric Cryptoanalysis

    1. Front Matter
      Pages 127-127
    2. Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang
      Pages 129-159
    3. Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier
      Pages 160-184
    4. Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
      Pages 185-212
    5. Mridul Nandi
      Pages 213-238
  5. Hashes and Random Oracles

    1. Front Matter
      Pages 239-239
    2. Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
      Pages 241-271
    3. Balthazar Bauer, Pooya Farshim, Sogol Mazaheri
      Pages 272-302
    4. Ilan Komargodski, Eylon Yogev
      Pages 303-327
  6. Trapdoor Functions

    1. Front Matter
      Pages 329-329
    2. Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas
      Pages 331-361
    3. Sanjam Garg, Mohammad Hajiabadi
      Pages 362-391
  7. Round Optimal MPC

    1. Front Matter
      Pages 393-393
    2. Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
      Pages 395-424
    3. Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
      Pages 459-487
    4. Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
      Pages 488-520
  8. Foundations

    1. Front Matter
      Pages 521-521
    2. Kasper Green Larsen, Jesper Buus Nielsen
      Pages 523-542
    3. Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
      Pages 543-574
  9. Lattices

    1. Front Matter
      Pages 575-575
    2. Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee
      Pages 577-607
    3. Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata
      Pages 608-637
    4. Andre Esser, Felix Heuer, Robert Kübler, Alexander May, Christian Sohler
      Pages 638-666
  10. Lattice-Based ZK

    1. Front Matter
      Pages 667-667
    2. Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafael del Pino, Jens Groth, Vadim Lyubashevsky
      Pages 669-699
    3. Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
      Pages 700-732
    4. Sam Kim, David J. Wu
      Pages 733-765
  11. Efficient MPC

    1. Front Matter
      Pages 767-767
    2. Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing
      Pages 769-798
    3. Ivan Damgård, Claudio Orlandi, Mark Simkin
      Pages 799-829
  12. Back Matter
    Pages 831-833

Other volumes

  1. 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I
  2. Advances in Cryptology – CRYPTO 2018
    38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II
  3. 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III

About these proceedings

Introduction

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Keywords

cryptography key management public key (asymmetric) techniques digital signatures public key encryption symmetric cryptography and hash functions block and stream ciphers cryptanalysis and other attacks information-theoretic techniques mathematical foundations of cryptography computer science authentication public key crypotography artificial intelligence electronic document identification systems

Editors and affiliations

  • Hovav Shacham
    • 1
  • Alexandra Boldyreva
    • 2
  1. 1.The University of Texas at AustinAustinUSA
  2. 2.Georgia Institute of TechnologyAtlantaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-96881-0
  • Copyright Information International Association for Cryptologic Research 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-96880-3
  • Online ISBN 978-3-319-96881-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site