© 2013

Advances in Cryptology – EUROCRYPT 2013

32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings

  • Thomas Johansson
  • Phong Q. Nguyen
Conference proceedings EUROCRYPT 2013

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7881)

Table of contents

  1. Front Matter
  2. Sanjam Garg, Craig Gentry, Shai Halevi
    Pages 1-17
  3. Nico Döttling, Jörn Müller-Quade
    Pages 18-34
  4. Vadim Lyubashevsky, Chris Peikert, Oded Regev
    Pages 35-54
  5. Mark Lewko, Adam O’Neill, Adam Smith
    Pages 55-75
  6. Marc Joye, Benoît Libert
    Pages 76-92
  7. Ananth Raghunathan, Gil Segev, Salil Vadhan
    Pages 93-110
  8. Ryo Nishimaki
    Pages 111-125
  9. Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
    Pages 126-141
  10. Emmanuel Prouff, Matthieu Rivain
    Pages 142-159
  11. Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs
    Pages 160-176
  12. Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
    Pages 194-210
  13. Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber
    Pages 211-227
  14. Franck Landelle, Thomas Peyrin
    Pages 228-244
  15. Florian Mendel, Tomislav Nad, Martin Schläffer
    Pages 262-278
  16. David Cash, Alptekin Küpçü, Daniel Wichs
    Pages 279-295
  17. Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
    Pages 296-312
  18. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
    Pages 313-314

About these proceedings


This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.


RAM programs RSA ciphertexts fully homomorphic encryption multiparty computation

Editors and affiliations

  • Thomas Johansson
    • 1
  • Phong Q. Nguyen
    • 2
  1. 1.Dept. of Electrical and Information TechnologyLund UniversityLundSweden
  2. 2.Départment d’informatiqueEcole normale supérieureParis Cedex 05France

Bibliographic information