Advertisement

Advances in Cryptology - EUROCRYPT 2015

34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II

  • Elisabeth Oswald
  • Marc Fischlin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9057)

Also part of the Security and Cryptology book sub series (LNSC, volume 9057)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Signatures

    1. Front Matter
      Pages 1-1
    2. Susan Hohenberger, Venkata Koppula, Brent Waters
      Pages 3-34
    3. Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi
      Pages 35-65
  3. Zero-Knowledge Proofs

    1. Front Matter
      Pages 67-67
    2. Michel Abdalla, Fabrice Benhamouda, David Pointcheval
      Pages 69-100
    3. Eike Kiltz, Hoeteck Wee
      Pages 101-128
  4. Leakage-Resilient Cryptography

    1. Front Matter
      Pages 129-129
    2. Stefan Dziembowski, Sebastian Faust, Maciej Skorski
      Pages 159-188
  5. Garbled Circuits

    1. Front Matter
      Pages 189-189
    2. Tore Kasper Frederiksen, Jesper Buus Nielsen, Claudio Orlandi
      Pages 191-219
    3. Samee Zahur, Mike Rosulek, David Evans
      Pages 220-250
  6. Crypto Currencies

    1. Front Matter
      Pages 251-251
    2. Jens Groth, Markulf Kohlweiss
      Pages 253-280
    3. Juan Garay, Aggelos Kiayias, Nikos Leonardos
      Pages 281-310
  7. Secret Sharing

    1. Front Matter
      Pages 311-311
    2. Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, Gabriele Spini
      Pages 313-336
    3. Elette Boyle, Niv Gilboa, Yuval Ishai
      Pages 337-367
  8. Outsourcing Computations

    1. Front Matter
      Pages 369-369
    2. Alessandro Chiesa, Eran Tromer, Madars Virza
      Pages 371-403
    3. Dan Boneh, Divya Gupta, Ilya Mironov, Amit Sahai
      Pages 404-436
  9. Obfuscation and E-Voting

    1. Front Matter
      Pages 437-437
    2. Joe Zimmerman
      Pages 439-467
    3. Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
      Pages 468-498
  10. Multi-party Computations

    1. Front Matter
      Pages 499-499
    2. Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
      Pages 501-531
    3. Melissa Chase, Rafail Ostrovsky, Ivan Visconti
      Pages 532-560
  11. Encryption

    1. Front Matter
      Pages 561-561
    2. Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman
      Pages 563-594
    3. Jie Chen, Romain Gay, Hoeteck Wee
      Pages 595-624
  12. Resistant Protocols

    1. Front Matter
      Pages 625-625
    2. Ilya Mironov, Noah Stephens-Davidowitz
      Pages 657-686
  13. Key Exchange

    1. Front Matter
      Pages 687-687
    2. Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt
      Pages 689-718
    3. Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen
      Pages 719-751
  14. Quantum Cryptography

  15. Discrete Logarithms

    1. Front Matter
      Pages 815-815
  16. Back Matter
    Pages 837-838

Other volumes

  1. 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I
  2. Advances in Cryptology - EUROCRYPT 2015
    34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II

About these proceedings

Introduction

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.

Keywords

AES Authenticated encryption Cluster computing Cryptanalysis Deterministic encryption Differential cryptanalysis Hash functions Ideal cipher Interactive theorem proving Lightweight cryptography Linear cryptanalysis Mapreduce Meet-in-the-middle Post-quantum cryptography Provable security Public key encryption Secure multiparty computation Security protocols Vectorized implementation zero knowledge

Editors and affiliations

  • Elisabeth Oswald
    • 1
  • Marc Fischlin
    • 2
  1. 1.University of BristolBristolUnited Kingdom
  2. 2.KryptoplexitätTU DarmstadtDarmstadtGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-46803-6
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-46802-9
  • Online ISBN 978-3-662-46803-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site