CRYPTO: International Cryptology Conference

Advances in Cryptology – CRYPTO 2014

34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II

  • Juan A. Garay
  • Rosario Gennaro
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8617)

Table of contents

  1. Front Matter
  2. Quantum Cryptography

  3. Foundations of Hardness

    1. Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs
      Pages 37-54
    2. Periklis A. Papakonstantinou, Guang Yang
      Pages 55-70
  4. Obfuscation II

    1. Nir Bitansky, Ran Canetti, Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai, Omer Paneth et al.
      Pages 71-89
    2. Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
      Pages 90-107
    3. Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth
      Pages 108-125
  5. Number-Theoretic Hardness

    1. Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
      Pages 126-145
  6. Side Channels and Leakage Resilience II

    1. Nir Bitansky, Dana Dachman-Soled, Huijia Lin
      Pages 146-163
    2. Prabhanjan Ananth, Vipul Goyal, Omkant Pandey
      Pages 164-182
  7. Information-Theoretic Security

    1. Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin
      Pages 183-198
    2. Deepesh Data, Manoj M. Prabhakaran, Vinod M. Prabhakaran
      Pages 199-216
    3. Oriol Farràs, Torben Hansen, Tarik Kaced, Carles Padró
      Pages 217-234
  8. Key Exchange and Secure Communication

    1. Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella-Béguelin
      Pages 235-255
    2. Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
      Pages 256-275
  9. Zero Knowledge

    1. Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
      Pages 276-294
    2. Ben Fisch, Daniel Freund, Moni Naor
      Pages 313-336
  10. Composable Security

About these proceedings

Introduction

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.

The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.

Keywords

Diffie-Hellman key exchange cryptanalysis and other attacks cryptography elliptic curves formal methods and theory of security hash functions and message authentication codes homomorphic encryption information-theoretic techniques key management mathematical foundations of cryptography multi-party computation public key (asymmetric) techniques quantum cryptography security protocols side-channel attacks symmetric cryptography and hash functions

Editors and affiliations

  • Juan A. Garay
    • 1
  • Rosario Gennaro
    • 2
  1. 1.Yahoo LabsSunnyvaleUSA
  2. 2.The City College of New YorkNew YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-44381-1
  • Copyright Information International Association for Cryptologic Research 2014 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-44380-4
  • Online ISBN 978-3-662-44381-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book