Advances in Cryptology – CRYPTO 2008

28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings

  • Editors
  • David Wagner
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5157)

Table of contents

  1. Front Matter
  2. Random Oracles

    1. Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin
      Pages 1-20
    2. Dennis Hofheinz, Eike Kiltz
      Pages 21-38
  3. Applications

    1. Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum
      Pages 39-56
    2. Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan
      Pages 57-74
  4. Public-Key Crypto I

    1. Dimitar Jetchev, Ramarathnam Venkatesan
      Pages 75-92
    2. Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam
      Pages 93-107
    3. Dan Boneh, Shai Halevi, Mike Hamburg, Rafail Ostrovsky
      Pages 108-125
    4. Brett Hemenway, Rafail Ostrovsky
      Pages 126-143
  5. Hash Functions I

    1. Helena Handschuh, Bart Preneel
      Pages 144-161
    2. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt
      Pages 162-178
    3. Christophe De Cannière, Christian Rechberger
      Pages 179-202
  6. Cryptanalysis I

    1. Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
      Pages 203-220
    2. Eli Biham, Yaniv Carmeli, Adi Shamir
      Pages 221-240
  7. Multiparty Computation I

    1. Ivan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam Smith
      Pages 241-261
  8. Cryptanalysis II

    1. Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret
      Pages 280-296
    2. Alexander Maximov, Dmitry Khovratovich
      Pages 297-316
  9. Public-Key Crypto II

    1. Cécile Delerablée, David Pointcheval
      Pages 317-334

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008.

The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on random oracles, applications, public-key crypto, hash functions, cryptanalysis, multiparty computation, privacy, zero knowledge, and oblivious transfer.

Keywords

algebraic geometry algorithms authentication broadcast encryption calculus collision resistance communication communication complexity complexity complexity analysis cryptographic protocols cryptography data encryption privacy security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-85174-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85173-8
  • Online ISBN 978-3-540-85174-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349