Advances in Cryptology – CRYPTO 2016

36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I

  • Matthew Robshaw
  • Jonathan Katz

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9814)

Also part of the Security and Cryptology book sub series (LNSC, volume 9814)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Provable Security for Symmetric Cryptography

  3. Asymmetric Cryptography and Cryptanalysis I

    1. Front Matter
      Pages 151-151
    2. Martin Albrecht, Shi Bai, Léo Ducas
      Pages 153-178
    3. Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban
      Pages 179-189
    4. Zvika Brakerski, Renen Perlman
      Pages 190-213
  4. Cryptography in Theory and Practice

    1. Front Matter
      Pages 245-245
    2. Thomas Shrimpton, Martijn Stam, Bogdan Warinschi
      Pages 277-307
    3. Geoffroy Couteau, Thomas Peters, David Pointcheval
      Pages 308-338
  5. Compromised Systems

    1. Front Matter
      Pages 339-339
    2. Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz
      Pages 341-372
    3. Mihir Bellare, Daniel Kane, Phillip Rogaway
      Pages 373-402
    4. Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage
      Pages 403-432

Other volumes

  1. Advances in Cryptology – CRYPTO 2016
    36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I
  2. 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II
  3. 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III

About these proceedings

Introduction

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.

The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Keywords

formal methods implementation security public key techniques symmetric cryptography authenticated encryption cryptanalysis and other attacks cryptography deployment security hash functions homomorphic encryption integer programming lightweight cryptography mathematical foundations of cryptography needles in haystacks post-quantum cryptography privacy-preserving protocols secure computation supersingular elliptic curves zero-knowledge

Editors and affiliations

  • Matthew Robshaw
    • 1
  • Jonathan Katz
    • 2
  1. 1.Impinj, Inc. SeattleUSA
  2. 2.University of Maryland College ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-53018-4
  • Copyright Information International Association for Cryptologic Research 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-53017-7
  • Online ISBN 978-3-662-53018-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book