Advances in Cryptology – CRYPTO 2012

32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings

  • Reihaneh Safavi-Naini
  • Ran Canetti
Conference proceedings

DOI: 10.1007/978-3-642-32009-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7417)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Viet Tung Hoang, Ben Morris, Phillip Rogaway
    Pages 1-13
  3. Will Landecker, Thomas Shrimpton, R. Seth Terashima
    Pages 14-30
  4. Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
    Pages 31-49
  5. Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander
    Pages 50-67
  6. Jonathan Zittrain
    Pages 86-86
  7. Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas
    Pages 124-143
  8. Amos Beimel, Oriol Farràs, Yuval Mintz
    Pages 144-161
  9. Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
    Pages 162-179
  10. Amit Sahai, Hakan Seyalioglu, Brent Waters
    Pages 199-217
  11. Brent Waters
    Pages 218-235
  12. Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
    Pages 273-293
  13. Mihir Bellare, Stefano Tessaro, Alexander Vardy
    Pages 294-311
  14. Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
    Pages 312-329

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions.

Keywords

elliptic curves hash functions multi-party computation provable security side-channel attacks

Editors and affiliations

  • Reihaneh Safavi-Naini
    • 1
  • Ran Canetti
    • 2
  1. 1.Department of Computer ScienceUniversity of CalgaryCalgaryCanada
  2. 2.Department of Computer ScienceUniversity of BostonBostonUSA

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2012 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-32008-8
  • Online ISBN 978-3-642-32009-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349