Update cookies preferences

E-book: Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II

Edited by , Edited by
  • Format: PDF+DRM
  • Series: Lecture Notes in Computer Science 9815
  • Pub. Date: 25-Jul-2016
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783662530085
  • Format - PDF+DRM
  • Price: 55,56 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: PDF+DRM
  • Series: Lecture Notes in Computer Science 9815
  • Pub. Date: 25-Jul-2016
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783662530085

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Provable security for symmetric cryptography.- Asymmetric cryptography and cryptanalysis.- Cryptography in theory and practice.- Compromised systems.- Symmetric cryptanalysis.- Algorithmic number theory.- Symmetric primitives.- Asymmetric cryptography.- Symmetric cryptography.- Cryptanalytic tools.- Hardware-oriented cryptography.- Secure computation and protocols.- Obfuscation.- Quantum techniques.- Spooky encryption.- IBE, ABE, and functional encryption.- Automated tools and synthesis.- Zero knowledge.- Theory.
Asymmetric Cryptography
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
3(30)
Takashi Yamakawa
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
Optimal Security Proofs for Signatures from Identification Schemes
33(29)
Eike Kiltz
Daniel Masny
Jiaxin Pan
FHE Circuit Privacy Almost for Free
62(31)
Florian Bourse
Rafael Del Pino
Michele Minelli
Hoeteck Wee
Symmetric Cryptography
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
93(30)
Leo Perrin
Aleksei Udovenko
Alex Biryukov
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
123(34)
Christof Beierle
Jeremy Jean
Stefan Kolbl
Gregor Leander
Amir Moradi
Thomas Peyrin
Yu Sasaki
Pascal Sasdrich
Siang Meng Sim
Cryptanalytic Tools
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
157(28)
Patrick Derbez
Pierre-Alain Fouque
Memory-Efficient Algorithms for Finding Needles in Haystacks
185(22)
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
Breaking Symmetric Cryptosystems Using Quantum Period Finding
207(34)
Marc Kaplan
Gaetan Leurent
Anthony Leverrier
Maria Naya-Plasencia
Hardware-Oriented Cryptography
Efficiently Computing Data-Independent Memory-Hard Functions
241(31)
Joel Alwen
Jeremiah Blocki
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
272(30)
Stefan Dziembowski
Sebastian Faust
Gottfried Herold
Anthony Journault
Daniel Masny
Francois-Xavier Standaert
ParTI -- Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
302(33)
Tobias Schneider
Amir Moradi
Tim Guneysu
Secure Computation and Protocols I
Network-Hiding Communication and Applications to Multi-party Protocols
335(31)
Martin Hirt
Ueli Maurer
Daniel Tschudi
Vassilis Zikas
Network Oblivious Transfer
366(31)
Ranjit Kumaresan
Srinivasan Raghuraman
Adam Sealfon
On the Power of Secure Two-Party Computation
397(33)
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Secure Protocol Transformations
430(29)
Yuval Ishai
Eyal Kushilevitz
Manoj Prabhakaran
Amit Sahai
Ching-Hua Yu
On the Communication Required for Unconditionally Secure Multiplication
459(32)
Ivan Damgard
Jesper Buus Nielsen
Antigoni Polychroniadou
Michael Raskin
Obfuscation
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
491(30)
Prabhanjan Ananth
Aayush Jain
Moni Naor
Amit Sahai
Eylon Yogev
Obfuscation Combiners
521(30)
Marc Fischlin
Amir Herzberg
Hod Bin-Noon
Haya Shulman
On Statistically Secure Obfuscation with Approximate Correctness
551(28)
Zvika Brakerski
Christina Brzuska
Nils Fleischhacker
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
579(28)
Sanjam Garg
Omkant Pandey
Akshayaram Srinivasan
Asymmetric Cryptography and Cryptanalysis II
Cryptanalysis of GGH15 Multilinear Maps
607(22)
Jean-Sebastien Coron
Moon Sung Lee
Tancrede Lepoint
Mehdi Tibouchi
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
629(30)
Eric Miles
Amit Sahai
Mark Zhandry
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
659(22)
Navid Alamati
Chris Peikert
Circular Security Separations for Arbitrary Length Cycles from LWE
681(20)
Venkata Koppula
Brent Waters
Author Index 701