Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8617)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: CRYPTO 2014.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.
The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.
Similar content being viewed by others
Keywords
- Diffie-Hellman key exchange
- cryptanalysis and other attacks
- cryptography
- elliptic curves
- formal methods and theory of security
- hash functions and message authentication codes
- homomorphic encryption
- information-theoretic techniques
- key management
- mathematical foundations of cryptography
- multi-party computation
- public key (asymmetric) techniques
- quantum cryptography
- security protocols
- side-channel attacks
- symmetric cryptography and hash functions
- algorithm analysis and problem complexity
Table of contents (29 papers)
-
Number-Theoretic Hardness
-
Side Channels and Leakage Resilience II
-
Key Exchange and Secure Communication
Other volumes
-
Advances in Cryptology – CRYPTO 2014
-
Advances in Cryptology – CRYPTO 2014
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Cryptology -- CRYPTO 2014
Book Subtitle: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II
Editors: Juan A. Garay, Rosario Gennaro
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-44381-1
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2014 2014
Softcover ISBN: 978-3-662-44380-4Published: 25 July 2014
eBook ISBN: 978-3-662-44381-1Published: 14 July 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 532
Number of Illustrations: 53 b/w illustrations
Topics: Cryptology, Systems and Data Security, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science