Advances in Cryptology – EUROCRYPT 2016

35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I

Conference proceedings EUROCRYPT 2016
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9665)

Table of contents

  1. Front Matter
    Pages I-XXVIII
  2. Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
    Pages 1-27
  3. Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs
    Pages 58-86
  4. Peter Gaži, Stefano Tessaro
    Pages 87-116
  5. Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam Smith
    Pages 117-146
  6. Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
    Pages 147-167
  7. Bin Zhang, Lin Jiao, Mingsheng Wang
    Pages 168-195
  8. Tyge Tiessen
    Pages 214-239
  9. François Durvaux, François-Xavier Standaert
    Pages 240-262
  10. Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves
    Pages 263-293
  11. Léo Ducas, Damien Stehlé
    Pages 294-310
  12. Pierrick Méaux, Anthony Journault, François-Xavier Standaert, Claude Carlet
    Pages 311-343
  13. Alex Biryukov, Léo Perrin, Aleksei Udovenko
    Pages 372-402
  14. Joost Renes, Craig Costello, Lejla Batina
    Pages 403-428
  15. Marc Stevens, Pierre Karpman, Thomas Peyrin
    Pages 459-483

Other volumes

  1. Advances in Cryptology – EUROCRYPT 2016
    35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I
  2. 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II

About these proceedings

Introduction

The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. 
The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.

Keywords

Computational complexity Embedded security Quantum complexity theory Secure computation Security and privacy Authenticated encryption Countermeasures Error-correcting codes Hardware attacks Hash functions Information-theoretic techniques Lattice-based cryptography Mathematical foundations of cryptography Oblivious transfer Optimization Pseudo random number generation Public-key encryption Random number generation Reverse-engineering Verification

Editors and affiliations

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-49890-3
  • Copyright Information International Association for Cryptologic Research 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-49889-7
  • Online ISBN 978-3-662-49890-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book