Advertisement

Advances in Cryptology -- EUROCRYPT 2015

34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I

  • Elisabeth Oswald
  • Marc Fischlin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9056)

Also part of the Security and Cryptology book sub series (LNSC, volume 9056)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Best Paper

    1. Front Matter
      Pages 1-1
    2. Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé
      Pages 3-12
  3. Honorable Mentions

    1. Front Matter
      Pages 13-13
    2. Viet Tung Hoang, Ted Krovetz, Phillip Rogaway
      Pages 15-44
  4. Random Number Generators

    1. Front Matter
      Pages 75-75
    2. Thomas Shrimpton, R. Seth Terashima
      Pages 77-100
    3. Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart
      Pages 101-126
  5. Number Field Sieve

    1. Front Matter
      Pages 127-127
    2. Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain
      Pages 129-155
  6. Algorithmic Cryptanalysis

    1. Front Matter
      Pages 171-171
    2. Alexandre Duc, Florian Tramèr, Serge Vaudenay
      Pages 173-202
  7. Symmetric Cryptanalysis I

  8. Symmetric Cryptanalysis II

    1. Front Matter
      Pages 285-285
    2. Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban
      Pages 315-342
  9. Hash Functions

    1. Front Matter
      Pages 343-343
    2. Gaëtan Leurent, Lei Wang
      Pages 345-367
    3. Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou et al.
      Pages 368-397
  10. Evaluating Implementations

    1. Front Matter
      Pages 399-399
    2. Alexandre Duc, Sebastian Faust, François-Xavier Standaert
      Pages 401-429
    3. Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner
      Pages 430-454
  11. Masking

    1. Front Matter
      Pages 455-455
    2. Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub
      Pages 457-485
    3. Josep Balasch, Sebastian Faust, Benedikt Gierlichs
      Pages 486-510
  12. Fully Homomorphic Encryption I

    1. Front Matter
      Pages 511-511
    2. Jung Hee Cheon, Damien Stehlé
      Pages 513-536
  13. Related-Key Attacks

    1. Front Matter
      Pages 557-557
    2. Xianhui Lu, Bao Li, Dingding Jia
      Pages 559-583
  14. Fully Homomorphic Encryption II

    1. Front Matter
      Pages 615-615
    2. Léo Ducas, Daniele Micciancio
      Pages 617-640
    3. Shai Halevi, Victor Shoup
      Pages 641-670
  15. Efficient Two-Party Protocols

    1. Front Matter
      Pages 671-671
    2. Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
      Pages 673-701
    3. Arash Afshar, Zhangxiang Hu, Payman Mohassel, Mike Rosulek
      Pages 702-729
  16. Symmetric Cryptanalysis III

    1. Front Matter
      Pages 731-731
    2. Itai Dinur, Paweł Morawiecki, Josef Pieprzyk, Marian Srebrny, Michał Straus
      Pages 733-761
    3. Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser
      Pages 762-786
  17. Lattices

  18. Back Matter
    Pages 817-818

Other volumes

  1. Advances in Cryptology -- EUROCRYPT 2015
    34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I
  2. 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II

About these proceedings

Introduction

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015.

The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.

Keywords

AES authenticated encryption cluster computing cryptanalysis deterministic encryption differential cryptanalysis hash functions ideal cipher interactive theorem proving lightweight cryptography linear cryptanalysis mapreduce meet-in-the-middle post-quantum cryptography provable security public key encryption secure multiparty computation security protocols vectorized implementation zero knowledge

Editors and affiliations

  • Elisabeth Oswald
    • 1
  • Marc Fischlin
    • 2
  1. 1.University of BristolBristolUnited Kingdom
  2. 2.Technische Universität DarmstadtDarmstadtGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-46800-5
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-46799-2
  • Online ISBN 978-3-662-46800-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site