Advances in Cryptology – CRYPTO 2008

28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings

  • Editors
  • David Wagner
Conference proceedings CRYPTO 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5157)

Table of contents

  1. Front Matter
  2. Random Oracles

    1. Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin
      Pages 1-20
    2. Dennis Hofheinz, Eike Kiltz
      Pages 21-38
  3. Applications

    1. Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum
      Pages 39-56
    2. Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan
      Pages 57-74
  4. Public-Key Crypto I

    1. Dimitar Jetchev, Ramarathnam Venkatesan
      Pages 75-92
    2. Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam
      Pages 93-107
    3. Dan Boneh, Shai Halevi, Mike Hamburg, Rafail Ostrovsky
      Pages 108-125
    4. Brett Hemenway, Rafail Ostrovsky
      Pages 126-143
  5. Hash Functions I

    1. Helena Handschuh, Bart Preneel
      Pages 144-161
    2. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt
      Pages 162-178
    3. Christophe De Cannière, Christian Rechberger
      Pages 179-202
  6. Cryptanalysis I

    1. Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
      Pages 203-220
    2. Eli Biham, Yaniv Carmeli, Adi Shamir
      Pages 221-240
  7. Multiparty Computation I

    1. Ivan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam Smith
      Pages 241-261
  8. Cryptanalysis II

    1. Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret
      Pages 280-296
    2. Alexander Maximov, Dmitry Khovratovich
      Pages 297-316
  9. Public-Key Crypto II

    1. Cécile Delerablée, David Pointcheval
      Pages 317-334
    2. Mihir Bellare, Marc Fischlin, Adam O’Neill, Thomas Ristenpart
      Pages 360-378
    3. Rafail Ostrovsky, William E. Skeith III
      Pages 379-396
  10. Hash Functions II

  11. Multiparty Computation II

    1. Joël Alwen, Abhi Shelat, Ivan Visconti
      Pages 497-514
    2. Zero Knowledge

      1. Yevgeniy Dodis, Victor Shoup, Shabsi Walfish
        Pages 515-535
      2. Chris Peikert, Vinod Vaikuntanathan
        Pages 536-553
    3. Oblivious Transfer

      1. Chris Peikert, Vinod Vaikuntanathan, Brent Waters
        Pages 554-571
      2. Yuval Ishai, Manoj Prabhakaran, Amit Sahai
        Pages 572-591
  12. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008.

The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on random oracles, applications, public-key crypto, hash functions, cryptanalysis, multiparty computation, privacy, zero knowledge, and oblivious transfer.


algebraic geometry algorithms authentication broadcast encryption calculus collision resistance communication communication complexity complexity complexity analysis cryptographic protocols cryptography data encryption privacy security

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-85173-8
  • Online ISBN 978-3-540-85174-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site