Advances in Cryptology – EUROCRYPT 2014

33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings

  • Phong Q. Nguyen
  • Elisabeth Oswald

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8441)

Table of contents

  1. Front Matter
  2. Public-Key Cryptanalysis

    1. Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé
      Pages 1-16
    2. Alain Couvreur, Ayoub Otmani, Jean–Pierre Tillich
      Pages 17-39
    3. Jean-Charles Faugère, Louise Huot, Antoine Joux, Guénaël Renault, Vanessa Vitse
      Pages 40-57
  3. Identity-Based Encryption

    1. Allison Lewko, Brent Waters
      Pages 58-76
    2. Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
      Pages 77-92
  4. Key Derivation and Quantum Computing

    1. Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
      Pages 93-110
    2. Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs
      Pages 111-128
    3. Dominique Unruh
      Pages 129-146
  5. Secret-Key Analysis and Implementations

  6. Obfuscation and Multilinear Maps

    1. Susan Hohenberger, Amit Sahai, Brent Waters
      Pages 201-220
    2. Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
      Pages 221-238
    3. Adeline Langlois, Damien Stehlé, Ron Steinfeld
      Pages 239-256
  7. Authenticated Encryption

    1. Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
      Pages 257-274
  8. Symmetric Encryption

    1. Ari Juels, Thomas Ristenpart
      Pages 293-310
    2. Ben Morris, Phillip Rogaway
      Pages 311-326
    3. Shan Chen, John Steinberger
      Pages 327-350

About these proceedings


This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.


algorithms authentication cryptanalysis and other attacks cryptographic techniques cryptography functional encryption hash functions identity-based encryption key management mathematical foundations of cryptography multi-party computation multi-party encryption multilinear maps obfuscation public key cryptanalysis quantum computing security services side-channel attacks signatures symmetric cryptography symmetric encryption

Editors and affiliations

  • Phong Q. Nguyen
    • 1
  • Elisabeth Oswald
    • 2
  1. 1.Départment d’informatiqueEcole normale supérieureParis Cedex 05France
  2. 2.Department of Computer ScienceUniversity of BristolBristolUK

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-55219-9
  • Online ISBN 978-3-642-55220-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book