Advances in Cryptology – CRYPTO 2014

34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II

  • Juan A. Garay
  • Rosario Gennaro
Conference proceedings CRYPTO 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8617)

Table of contents

  1. Front Matter
  2. Quantum Cryptography

  3. Foundations of Hardness

    1. Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs
      Pages 37-54
    2. Periklis A. Papakonstantinou, Guang Yang
      Pages 55-70
  4. Obfuscation II

    1. Nir Bitansky, Ran Canetti, Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai, Omer Paneth et al.
      Pages 71-89
    2. Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
      Pages 90-107
    3. Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth
      Pages 108-125
  5. Number-Theoretic Hardness

    1. Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
      Pages 126-145
  6. Side Channels and Leakage Resilience II

    1. Nir Bitansky, Dana Dachman-Soled, Huijia Lin
      Pages 146-163
    2. Prabhanjan Ananth, Vipul Goyal, Omkant Pandey
      Pages 164-182
  7. Information-Theoretic Security

    1. Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin
      Pages 183-198
    2. Deepesh Data, Manoj M. Prabhakaran, Vinod M. Prabhakaran
      Pages 199-216
    3. Oriol Farràs, Torben Hansen, Tarik Kaced, Carles Padró
      Pages 217-234
  8. Key Exchange and Secure Communication

    1. Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella-Béguelin
      Pages 235-255
    2. Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
      Pages 256-275
  9. Zero Knowledge

    1. Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
      Pages 276-294
    2. Ben Fisch, Daniel Freund, Moni Naor
      Pages 313-336
  10. Composable Security

  11. Secure Computation – Foundations

    1. Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
      Pages 369-386
    2. Amos Beimel, Ariel Gabizon, Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Anat Paskin-Cherniavsky
      Pages 387-404
    3. Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder
      Pages 405-420
    4. Iddo Bentov, Ranjit Kumaresan
      Pages 421-439
  12. Secure Computation – Implementations

    1. Vladimir Kolesnikov, Payman Mohassel, Mike Rosulek
      Pages 440-457
    2. Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff
      Pages 458-475
    3. Enrique Larraia, Emmanuela Orsini, Nigel P. Smart
      Pages 495-512
    4. Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, Vassilis Zikas
      Pages 513-530
  13. Back Matter

Other volumes

  1. 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I
  2. Advances in Cryptology – CRYPTO 2014
    34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II

About these proceedings


The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.

The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.


Diffie-Hellman key exchange cryptanalysis and other attacks cryptography elliptic curves formal methods and theory of security hash functions and message authentication codes homomorphic encryption information-theoretic techniques key management mathematical foundations of cryptography multi-party computation public key (asymmetric) techniques quantum cryptography security protocols side-channel attacks symmetric cryptography and hash functions

Editors and affiliations

  • Juan A. Garay
    • 1
  • Rosario Gennaro
    • 2
  1. 1.Yahoo LabsSunnyvaleUSA
  2. 2.The City College of New YorkNew YorkUSA

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2014 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-662-44380-4
  • Online ISBN 978-3-662-44381-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site