My Library

University LibraryCatalogue

     
Limit search to items available for borrowing or consultation
Record 2 of 5
Result Page: Previous Next
Can't find that book? Try BONUS+
 
Look for full text

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

Book Cover
E-RESOURCE
Author CRYPTO (Conference) (33rd : 2013 : Santa Barbara, Calif.)

Title Advances in cryptology : CRYPTO 2013 : 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18-22, 2013, proceedings, Part II / Ran Canetti, Juan A. Garay (eds.).

Published Heidelberg : Springer, [2013]
©2013

Copies

Location Call No. Status
 UniM INTERNET resource    AVAILABLE
Physical description 1 online resource (xvii, 556 pages) : illustrations.
Series Lecture notes in computer science, 0302-9743 ; 8043
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8043.
LNCS sublibrary. SL 4, Security and cryptology.
Springer Lecture Notes in Computer Science
Contents Session 11: Implementation-Oriented Protocols. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries / Yehuda Lindell -- Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose / Yan Huang, Jonathan Katz, David Evans -- Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation / Payman Mohassel, Ben Riva -- Improved OT Extension for Transferring Short Secrets / Vladimir Kolesnikov, Ranjit Kumaresan -- Time-Optimal Interactive Proofs for Circuit Evaluation / Justin Thaler -- SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge / Eli Ben-Sasson ... et al. -- Invited Talk: Why the Web Still Runs on RC4.
Session 12: Number-Theoretic Hardness. On the Function Field Sieve and the Impact of Higher Splitting Probabilities / Faruk Göloğlu ... et al. -- An Algebraic Framework for Diffie-Hellman Assumptions / Alex Escala ... et al. -- rHard-Core Predicates for a Diffie-Hellman Problem over Finite Fields / Nelly Fazio ... et al.
Session 13: MPC -- Foundations. Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys / Benny Applebaum ... et al. -- Efficient Multiparty Protocols via Log-Depth Threshold Formulae / Gil Cohen ... et al. -- A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation / Martin Hirt, Ueli Maurer, Christoph Lucas -- What Information Is Leaked under Concurrent Composition? / Vipul Goyal, Divya Gupta, Abhishek Jain.
Session 14: Codes and Secret Sharing. Non-malleable Codes from Two-Source Extractors / Stefan Dziembowski, Tomasz Kazana, Maciej Obremski -- Optimal Coding for Streaming Authentication and Interactive Communication / Matthew Franklin ... et al. -- Secret Sharing, Rank Inequalities and Information Inequalities / Sebastià Martín, Carles Padró, An Yang.
Session 15: Signatures and Authentication. Linearly Homomorphic Structure-Preserving Signatures and Their Applications / Benoît Libert ... et al. -- Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs / Vadim Lyubashevsky, Daniel Masny.
Session 16: Quantum Security. Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling / Frédéric Dupuis, Omar Fawzi, Stephanie Wehner -- Quantum One-Time Programs / Anne Broadbent, Gus Gutoski, Douglas Stebila -- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World / Dan Boneh, Mark Zhandry -- Everlasting Multi-party Computation / Dominique Unruh.
Session 17: New Primitives. -- Instantiating Random Oracles via UCEs / Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi -- Obfuscating Conjunctions / Zvika Brakerski, Guy N. Rothblum.
Session 18: Functional Encryption I. Fully, (Almost) Tightly Secure IBE and Dual System Groups / Jie Chen, Hoeteck Wee -- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption / Dan Boneh, Ananth Raghunathan, Gil Segev -- Attribute-Based Encryption for Circuits from Multilinear Maps / Sanjam Garg ... et al.
Session 19: Functional Encryption II. Functional Encryption: New Perspectives and Lower Bounds / Shweta Agrawal ... et al. -- On the Achievability of Simulation-Based Security for Functional Encryption / Angelo De Caro ... et al. -- How to Run Turing Machines on Encrypted Data / Shafi Goldwasser ... et al.
Implementation-Oriented Protocols -- Number-Theoretic Hardness -- MPC-Foundations -- Codes and Secret Sharing -- Signatures and Authentication -- Quantum Security -- New Primitives -- Functional Encryption.
Bibliography Includes bibliographical references and author index.
Summary The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.
Notes nnam (MP) Advances in cryptology (NL-LeOCL)364477881 (OCoLC)872280776
Other author Canetti, Ran, editor.
Garay, Juan A., editor.
International Association for Cryptologic Research, sponsoring body.
SpringerLink issuing body.
Subject Computers -- Access control -- Congresses.
Computer security -- Congresses.
Cryptography -- Congresses.
Electronic books.
Conference papers and proceedings.
ISBN 9783642400841
3642400841
3642400833
9783642400834
Standard Number 10.1007/978-3-642-40084-1