Advertisement

Advances in Cryptology – EUROCRYPT 2014

33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings

  • Phong Q. Nguyen
  • Elisabeth Oswald

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8441)

Table of contents

  1. Front Matter
  2. Public-Key Cryptanalysis

    1. Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé
      Pages 1-16
    2. Alain Couvreur, Ayoub Otmani, Jean–Pierre Tillich
      Pages 17-39
    3. Jean-Charles Faugère, Louise Huot, Antoine Joux, Guénaël Renault, Vanessa Vitse
      Pages 40-57
  3. Identity-Based Encryption

    1. Allison Lewko, Brent Waters
      Pages 58-76
    2. Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
      Pages 77-92
  4. Key Derivation and Quantum Computing

    1. Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
      Pages 93-110
    2. Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs
      Pages 111-128
    3. Dominique Unruh
      Pages 129-146
  5. Secret-Key Analysis and Implementations

  6. Obfuscation and Multilinear Maps

    1. Susan Hohenberger, Amit Sahai, Brent Waters
      Pages 201-220
    2. Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
      Pages 221-238
    3. Adeline Langlois, Damien Stehlé, Ron Steinfeld
      Pages 239-256
  7. Authenticated Encryption

    1. Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
      Pages 257-274
  8. Symmetric Encryption

    1. Ari Juels, Thomas Ristenpart
      Pages 293-310
    2. Ben Morris, Phillip Rogaway
      Pages 311-326
    3. Shan Chen, John Steinberger
      Pages 327-350
    4. David Cash, Stefano Tessaro
      Pages 351-368
  9. Multi-party Computation

    1. Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva
      Pages 387-404
    2. Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs
      Pages 405-422
  10. Side-Channel Attacks

    1. Alexandre Duc, Stefan Dziembowski, Sebastian Faust
      Pages 423-440
    2. Jean-Sébastien Coron
      Pages 441-458
    3. François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon
      Pages 459-476
  11. Signatures and Public-Key Encryption

  12. Functional Encryption

    1. Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev et al.
      Pages 533-556
    2. Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu et al.
      Pages 578-602
  13. Foundations

  14. Multi-party Computation

    1. Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
      Pages 659-676
    2. Juan A. Garay, Yuval Ishai, Ranjit Kumaresan, Hoeteck Wee
      Pages 677-694
  15. Back Matter

About these proceedings

Introduction

This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

Keywords

algorithms authentication cryptanalysis and other attacks cryptographic techniques cryptography functional encryption hash functions identity-based encryption key management mathematical foundations of cryptography multi-party computation multi-party encryption multilinear maps obfuscation public key cryptanalysis quantum computing security services side-channel attacks signatures symmetric cryptography symmetric encryption

Editors and affiliations

  • Phong Q. Nguyen
    • 1
  • Elisabeth Oswald
    • 2
  1. 1.Départment d’informatiqueEcole normale supérieureParis Cedex 05France
  2. 2.Department of Computer ScienceUniversity of BristolBristolUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-55220-5
  • Copyright Information International Association for Cryptologic Research 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-55219-9
  • Online ISBN 978-3-642-55220-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site