My Library

University LibraryCatalogue

     
Limit search to items available for borrowing or consultation
Record 3 of 5
Result Page: Previous Next
Can't find that book? Try BONUS+
 
Look for full text

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

Book Cover
E-RESOURCE
Author CRYPTO (Conference) (33rd : 2013 : Santa Barbara, Calif.), author.

Title Advances in cryptology : CRYPTO 2013 : 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013, proceedings, Part I / Ran Canetti, Juan A. Garay (eds.).

Published Heidelberg : Springer, [2013]
©2013

Copies

Location Call No. Status
 UniM INTERNET resource    AVAILABLE
Physical description 1 online resource (xvii, 590 pages) : illustrations.
Series Lecture notes in computer science, 0302-9743 ; 8042
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8042.
LNCS sublibrary. SL 4, Security and cryptology.
Springer Lecture Notes in Computer Science
Contents Session 1: Lattices and FHE. Practical Bootstrapping in Quasilinear Time / Jacob Alperin-Sheriff, Chris Peikert -- Hardness of SIS and LWE with Small Parameters / Daniele Micciancio, Chris Peikert -- Lattice Signatures and Bimodal Gaussians / Léo Ducas ... et al. -- Learning with Rounding, Revisited / Joël Alwen ... et al. -- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / Craig Gentry, Amit Sahai, Brent Waters -- Invited Talk: Crypto Wars Part 2 Have Begun.
Session 2: Foundations of Hardness. A Uniform Min-Max Theorem with Applications in Cryptography / Salil Vadhan, Colin Jia Zheng -- Limits of Provable Security for Homomorphic Encryption / Andrej Bogdanov, Chin Ho Lee.
Session 3: Cryptanalysis I. Counter-Cryptanalysis / Marc Stevens -- Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System / Daehyun Strobel ... et al. -- Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking / Bin Zhang, Chao Xu, Dengguo Feng.
Session 4: Cryptanalysis II. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 / Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin -- Bounds in Shallows and in Miseries / Céline Blondeau, Andrey Bogdanov, Gregor Leander -- Sieve-in-the-Middle: Improved MITM Attacks / Anne Canteaut, María Naya-Plasencia, Bastien Vayssière -- Construction of Differential Characteristics in ARX Designs Application to Skein / Gaëtan Leurent.
Session 5: MPC -- New Directions. On Fair Exchange, Fair Coins and Fair Sampling / Shashank Agrawal, Manoj Prabhakaran -- Limits on the Power of Cryptographic Cheap Talk / Pavel Hubáček, Jesper Buus Nielsen, Alon Rosen -- Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols / Vipul Goyal ... et al.
Session 6: Leakage Resilience. Secure Computation against Adaptive Auxiliary Information / Elette Boyle ... et al. -- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions / François-Xavier Standaert, Olivier Pereira, Yu Yu.
Session 7: Symmetric Encryption and PRFs. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries / David Cash ... et al. -- Message-Locked Encryption for Lock-Dependent Messages / Martín Abadi ... et al. -- The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries / Thomas Ristenpart, Scott Yilek -- Key Homomorphic PRFs and Their Applications / Dan Boneh ... et al.
Session 8: Key Exchange. On the Security of the TLS Protocol: A Systematic Analysis / Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee -- New Techniques for SPHFs and Efficient One-Round PAKE Protocols / Fabrice Benhamouda ... et al.-- Session 9: Multi Linear Maps. Practical Multilinear Maps over the Integers / Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi -- Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures / Susan Hohenberger, Amit Sahai, Brent Waters -- Programmable Hash Functions in the Multilinear Setting / Eduarda S.V. Freire ... et al.
Session 10: Ideal Ciphers. On the Indifferentiability of Key-Alternating Ciphers / Elena Andreeva ... et al. -- Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers / Peter Gaži -- Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions / Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy.
Bibliography Includes bibliographical references and author index.
Summary The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.
Other author Canetti, Ran, editor.
Garay, Juan A., editor.
International Association for Cryptologic Research, sponsoring body.
SpringerLink issuing body.
Subject Computers -- Access control -- Congresses.
Computer security -- Congresses.
Cryptography -- Congresses.
Electronic books.
Conference papers and proceedings.
ISBN 9783642400414
3642400418
9783642400407
364240040X
Standard Number 10.1007/978-3-642-40041-4