Limit search to available items
Book Cover
Author CRYPTO (Conference) (32nd : 2012 : Santa Barbara, Calif.)

Title Advances in cryptology-- CRYPTO 2012 : 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings / Reihaneh Safavi-Naini, Ran Canetti (eds.)
Published Berlin ; New York : Springer, [2012]
Online access available from:
Springer eBooks    View Resource Record  


Description 1 online resource (xv, 888 pages) : illustrations
Series Lecture notes in computer science, 1611-3349 ; 7417
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7417. 1611-3349
LNCS sublibrary. SL 4, Security and cryptology.
Contents An Enciphering Scheme Based on a Card Shuffle / Viet Tung Hoang, Ben Morris and Phillip Rogaway -- Tweakable Blockciphers with Beyond Birthday-Bound Security / Will Landecker, Thomas Shrimpton and R. Seth Terashima -- Breaking and Repairing GCM Security Proofs / Tetsu Iwata, Keisuke Ohashi and Kazuhiko Minematsu -- On the Distribution of Linear Biases: Three Instructive Examples / Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen and Gregor Leander -- Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs / Eric Miles and Emanuele Viola -- The End of Crypto / Jonathan Zittrain -- Must You Know the Code of f to Securely Compute f? / Mike Rosulek -- Adaptively Secure Multi-Party Computation with Dishonest Majority / Sanjam Garg and Amit Sahai -- Collusion-Preserving Computation / Joël Alwen, Jonathan Katz, Ueli Maurer and Vassilis Zikas -- Secret Sharing Schemes for Very Dense Graphs / Amos Beimel, Oriol Farràs and Yuval Mintz -- Functional Encryption with Bounded Collusions via Multi-party Computation / Sergey Gorbunov, Vinod Vaikuntanathan and Hoeteck Wee -- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques / Allison Lewko and Brent Waters -- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption / Amit Sahai, Hakan Seyalioglu and Brent Waters
Functional Encryption for Regular Languages / Brent Waters -- Secure Database Commitments and Universal Arguments of Quasi Knowledge / Melissa Chase and Ivan Visconti -- Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits / Nir Bitansky and Alessandro Chiesa -- On the Security of TLS-DHE in the Standard Model / Tibor Jager, Florian Kohlar, Sven Schäge and Jörg Schwenk -- Semantic Security for the Wiretap Channel / Mihir Bellare, Stefano Tessaro and Alexander Vardy -- Multi-instance Security and Its Application to Password-Based Cryptography / Mihir Bellare, Thomas Ristenpart and Stefano Tessaro -- Hash Functions Based on Three Permutations: A Generic Security Analysis / Bart Mennink and Bart Preneel -- To Hash or Not to Hash Again? (In)Differentiability Results for H2 and HMAC / Yevgeniy Dodis, Thomas Ristenpart, John Steinberger and Stefano Tessaro -- New Preimage Attacks against Reduced SHA-1 / Simon Knellwolf and Dmitry Khovratovich -- Stam's Conjecture and Threshold Phenomena in Collision Resistance / John Steinberger, Xiaoming Sun and Zhe Yang -- Universal Composability from Essentially Any Trusted Setup / Mike Rosulek -- Impossibility Results for Static Input Secure Computation / Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky and Ivan Visconti -- New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation / Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran and Amit Sahai
Black-Box Constructions of Composable Protocols without Set-Up / Huijia Lin and Rafael Pass -- Crowd-Blending Privacy / Johannes Gehrke, Michael Hay, Edward Lui and Rafael Pass -- Differential Privacy with Imperfect Randomness / Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov and Salil Vadhan -- Tamper and Leakage Resilience in the Split-State Model / Feng-Hao Liu and Anna Lysyanskaya -- Securing Circuits against Constant-Rate Tampering / Dana Dachman-Soled and Yael Tauman Kalai -- How to Compute under AC\sf0Unknown control sequence '\sf' Leakage without Secure Hardware / Guy N. Rothblum -- Recent Advances and Existing Research Questions in Platform Security / Ernie Brickell -- Group Signatures with Almost-for-Free Revocation / Benoît Libert, Thomas Peters and Moti Yung -- Tightly Secure Signatures and Public-Key Encryption / Dennis Hofheinz and Tibor Jager -- Efficient Padding Oracle Attacks on Cryptographic Hardware / Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato and Graham Steel, et al. -- Public Keys / Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos and Thorsten Kleinjung, et al. -- Multiparty Computation from Somewhat Homomorphic Encryption / Ivan Damgård, Valerio Pastro, Nigel Smart and Sarah Zakarias -- Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority / Eli Ben-Sasson, Serge Fehr and Rafail Ostrovsky
A New Approach to Practical Active-Secure Two-Party Computation / Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi and Sai Sheshank Burra -- The Curious Case of Non-Interactive Commitments -- On the Power of Black-Box vs. Non-Black-Box Use of Primitives / Mohammad Mahmoody and Rafael Pass -- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems / Itai Dinur, Orr Dunkelman, Nathan Keller and Adi Shamir -- Resistance against Iterated Attacks by Decorrelation Revisited, / Aslı Bay, Atefeh Mashatan and Serge Vaudenay -- Secure Identity-Based Encryption in the Quantum Random Oracle Model / Mark Zhandry -- Quantum to Classical Randomness Extractors / Mario Berta, Omar Fawzi and Stephanie Wehner -- Actively Secure Two-Party Evaluation of Any Quantum Operation / Frédéric Dupuis, Jesper Buus Nielsen and Louis Salvail -- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups / Goichiro Hanaoka, Takahiro Matsuda and Jacob C.N. Schuldt -- Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves / Alexandre Duc and Dimitar Jetchev -- Homomorphic Evaluation of the AES Circuit / Craig Gentry, Shai Halevi and Nigel P. Smart -- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP / Zvika Brakerski
Summary This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information Systems
Management of Computing and Information Systems
Systems and Data Security
Notes International conferenc proceedings
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed Aug. 23, 2012)
Subject Data encryption (Computer science) -- Congresses.
Computer security -- Congresses.
Genre/Form Conference papers and proceedings.
Conference papers and proceedings.
Form Electronic book
Author Safavi-Naini, Reihanah.
Canetti, Ran.
LC no. 2012942915
ISBN 9783642320095 (electronic bk.)
3642320090 (electronic bk.)
Other Titles CRYPTO 2012