Advances in Cryptology – CRYPTO 2011

31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings

  • Phillip Rogaway

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6841)

Table of contents

  1. Front Matter
  2. Randomness and Its Use

    1. Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert et al.
      Pages 1-20
    2. Paul Baecher, Marc Fischlin
      Pages 21-38
    3. Mohammad Mahmoody, Tal Moran, Salil Vadhan
      Pages 39-50
    4. Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
      Pages 51-70
  3. Computer-Assisted Cryptographic Proofs

    1. Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella Béguelin
      Pages 71-90
  4. Outsourcing and Delegating Computation

    1. Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
      Pages 91-110
    2. Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis
      Pages 111-131
    3. Shai Halevi, Yehuda Lindell, Benny Pinkas
      Pages 132-150
    4. Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz
      Pages 151-168
  5. Symmetric Cryptanalysis and Constructions

    1. Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque
      Pages 169-187
    2. María Naya-Plasencia
      Pages 188-205
    3. Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner
      Pages 206-221
    4. Jian Guo, Thomas Peyrin, Axel Poschmann
      Pages 222-239
  6. Secure Computation

    1. Gilad Asharov, Yehuda Lindell, Tal Rabin
      Pages 240-258
    2. Yehuda Lindell, Eli Oxman, Benny Pinkas
      Pages 259-276
    3. Amos Beimel, Yehuda Lindell, Eran Omri, Ilan Orlov
      Pages 277-296
  7. Leakage and Side Channels

    1. Sanjam Garg, Abhishek Jain, Amit Sahai
      Pages 297-315
    2. Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
      Pages 335-353

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.

Keywords

cryptanalysis cryptographic attacks cryptographic protocols cryptography digital signature schemes encryption multi-party computation

Editors and affiliations

  • Phillip Rogaway
    • 1
  1. 1.Computer ScienceUniversity of CaliforniaDavisUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-22792-9
  • Copyright Information International Association for Cryptologic Research 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-22791-2
  • Online ISBN 978-3-642-22792-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book