×

Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. (English) Zbl 1292.94002

Lecture Notes in Computer Science 8616. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). xviii, 574 p. (2014).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1270.94007; Zbl 1270.94006]. For Part II of the proceedings of the present conference see [Zbl 1292.94001].
Indexed articles:
Bellare, Mihir; Paterson, Kenneth G.; Rogaway, Phillip, Security of symmetric encryption against mass surveillance, 1-19 [Zbl 1317.94084]
Dai, Yuanxi; Lee, Jooyoung; Mennink, Bart; Steinberger, John, The security of multiple encryption in the ideal cipher model, 20-38 [Zbl 1317.94100]
Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John, Minimizing the two-round Even-Mansour cipher, 39-56 [Zbl 1317.94095]
Albrecht, Martin R.; Driessen, Benedikt; Kavun, Elif Bilge; Leander, Gregor; Paar, Christof; Yalçın, Tolga, Block ciphers – focus on the linear layer (feat. PRIDE), 57-76 [Zbl 1317.94079]
Abdalla, Michel; Benhamouda, Fabrice; Passelègue, Alain; Paterson, Kenneth G., Related-key security for pseudorandom functions beyond the linear barrier, 77-94 [Zbl 1343.94035]
Barthe, Gilles; Fagerholm, Edvard; Fiore, Dario; Mitchell, John; Scedrov, Andre; Schmidt, Benedikt, Automated analysis of cryptographic assumptions in generic group models, 95-112 [Zbl 1343.94040]
Gaži, Peter; Pietrzak, Krzysztof; Rybár, Michal, The exact PRF-security of NMAC and HMAC, 113-130 [Zbl 1343.94050]
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei, Updates on generic attacks against HMAC and NMAC, 131-148 [Zbl 1343.94059]
Dinur, Itai; Leurent, Gaëtan, Improved generic attacks against hash-based MACs and HAIFA, 149-168 [Zbl 1343.94047]
Bellare, Mihir; Hoang, Viet Tung; Keelveedhi, Sriram, Cryptography from compression functions: the UCE bridge to the ROM, 169-187 [Zbl 1343.94043]
Brzuska, Christina; Farshim, Pooya; Mittelbach, Arno, Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources, 188-205 [Zbl 1317.94091]
Boneh, Dan; Waters, Brent; Zhandry, Mark, Low overhead broadcast encryption from multilinear maps, 206-223 [Zbl 1317.94087]
Lee, Hyung Tae; Seo, Jae Hong, Security analysis of multilinear maps over the integers, 224-240 [Zbl 1343.94069]
Abe, Masayuki; Groth, Jens; Ohkubo, Miyako; Tango, Takeya, Converting cryptographic schemes from symmetric to asymmetric bilinear groups, 241-260 [Zbl 1343.94036]
Herold, Gottfried; Hesse, Julia; Hofheinz, Dennis; Ràfols, Carla; Rupp, Andy, Polynomial spaces: a new framework for composite-to-prime-order transformations, 261-279 [Zbl 1343.94063]
Lenstra, H. W.; Silverberg, A., Revisiting the Gentry-Szydlo algorithm, 280-296 [Zbl 1343.94070]
Alperin-Sheriff, Jacob; Peikert, Chris, Faster bootstrapping with polynomial error, 297-314 [Zbl 1336.94034]
Ling, San; Phan, Duong Hieu; Stehlé, Damien; Steinfeld, Ron, Hardness of \(k\)-LWE and applications in traitor tracing, 315-334 [Zbl 1343.94071]
Ducas, Léo; Micciancio, Daniele, Improved short lattice signatures in the standard model, 335-352 [Zbl 1345.94058]
Banerjee, Abhishek; Peikert, Chris, New and improved key-homomorphic pseudorandom functions, 353-370 [Zbl 1314.94053]
Catalano, Dario; Fiore, Dario; Warinschi, Bogdan, Homomorphic signatures with efficient verification for polynomial functions, 371-389 [Zbl 1345.94049]
Abe, Masayuki; Groth, Jens; Ohkubo, Miyako; Tibouchi, Mehdi, Structure-preserving signatures from type II pairings, 390-407 [Zbl 1345.94029]
Blazy, Olivier; Kiltz, Eike; Pan, Jiaxin, (Hierarchical) identity-based encryption from affine message authentication, 408-425 [Zbl 1345.94044]
Gentry, Craig; Lewko, Allison; Waters, Brent, Witness encryption from instance independent assumptions, 426-443 [Zbl 1345.94064]
Genkin, Daniel; Shamir, Adi; Tromer, Eran, RSA key extraction via low-bandwidth acoustic cryptanalysis, 444-461 [Zbl 1345.94063]
Austrin, Per; Chung, Kai-Min; Mahmoody, Mohammad; Pass, Rafael; Seth, Karn, On the impossibility of cryptography with tamperable randomness, 462-479 [Zbl 1345.94033]
Boneh, Dan; Zhandry, Mark, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, 480-499 [Zbl 1310.94130]
Pass, Rafael; Seth, Karn; Telang, Sidharth, Indistinguishability obfuscation from semantically-secure multilinear encodings, 500-517 [Zbl 1343.94076]
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel, On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input, 518-535 [Zbl 1336.94048]
Ostrovsky, Rafail; Paskin-Cherniavsky, Anat; Paskin-Cherniavsky, Beni, Maliciously circuit-private FHE, 536-553 [Zbl 1343.94075]
Halevi, Shai; Shoup, Victor, Algorithms in HElib, 554-571 [Zbl 1343.94061]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI