Advertisement

Advances in Cryptology – EUROCRYPT 2016

35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II

  • Marc Fischlin
  • Jean-Sébastien Coron

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9666)

Also part of the Security and Cryptology book sub series (LNSC, volume 9666)

Table of contents

  1. Front Matter
    Pages I-XX
  2. Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
    Pages 63-92
  3. Apoorvaa Deshpande, Venkata Koppula, Brent Waters
    Pages 124-153
  4. Dakshita Khurana, Hemanta K. Maji, Amit Sahai
    Pages 184-212
  5. Dakshita Khurana, Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
    Pages 213-242
  6. Mohammad Mahmoody, Ameer Mohammed
    Pages 243-272
  7. Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
    Pages 273-304
  8. Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit
    Pages 327-357
  9. Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro
    Pages 358-387
  10. Ryo Nishimaki, Daniel Wichs, Mark Zhandry
    Pages 388-419
  11. Ivan Damgård, Jesper Buus Nielsen, Rafail Ostrovsky, Adi Rosén
    Pages 420-447
  12. Sanjam Garg, Pratyay Mukherjee, Omkant Pandey, Antigoni Polychroniadou
    Pages 448-476
  13. Dominique Unruh
    Pages 497-527
  14. Nicolas Gama, Malika Izabachène, Phong Q. Nguyen, Xiang Xie
    Pages 528-558
  15. Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev
    Pages 559-585
  16. Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust
    Pages 586-615
  17. Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
    Pages 616-648
  18. Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam
    Pages 649-678
  19. Yevgeniy Dodis, Martijn Stam, John Steinberger, Tianren Liu
    Pages 679-704
  20. Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas
    Pages 705-734
  21. Pratyay Mukherjee, Daniel Wichs
    Pages 735-763
  22. Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry
    Pages 764-791
  23. Mihir Bellare, Igors Stepanovs, Brent Waters
    Pages 792-821
  24. Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
    Pages 822-851
  25. Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
    Pages 881-908
  26. Back Matter
    Pages 909-911

Other volumes

  1. 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I
  2. Advances in Cryptology – EUROCRYPT 2016
    35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II

About these proceedings

Introduction

The two-volume proceedings LNCS 9665 + 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.

 

Keywords

Computational complexity Embedded security Quantum complexity theory Secure computation Security and privacy Authenticated encryption Countermeasures Error-correcting codes Hardware attacks Hash functions Information-theoretic techniques Lattice-based cryptography Mathematical foundations of cryptography Oblivious transfer Optimization Pseudo random number generation Public-key encryption Random number generation Reverse-engineering Verification

Editors and affiliations

  • Marc Fischlin
    • 1
  • Jean-Sébastien Coron
    • 2
  1. 1.Technische Universität DarmstadtDarmstadtGermany
  2. 2.University of LuxembourgLuxembourgLuxembourg

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-49896-5
  • Copyright Information International Association for Cryptologic Research 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-49895-8
  • Online ISBN 978-3-662-49896-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site