Advances in Cryptology -- EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015.

The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.

Author(s): Elisabeth Oswald, Marc Fischlin (eds.)
Series: Lecture Notes in Computer Science 9056
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2015

Language: English
Pages: 818
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Systems and Data Security; Management of Computing and Information Systems

Front Matter....Pages I-XVII
Front Matter....Pages 1-1
Cryptanalysis of the Multilinear Map over the Integers....Pages 3-12
Front Matter....Pages 13-13
Robust Authenticated-Encryption AEZ and the Problem That It Solves....Pages 15-44
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks....Pages 45-74
Front Matter....Pages 75-75
A Provable-Security Analysis of Intel’s Secure Key RNG....Pages 77-100
A Formal Treatment of Backdoored Pseudorandom Generators....Pages 101-126
Front Matter....Pages 127-127
Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields....Pages 129-155
The Multiple Number Field Sieve with Conjugation and Generalized Joux-Lercier Methods....Pages 156-170
Front Matter....Pages 171-171
Better Algorithms for LWE and LWR....Pages 173-202
On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes....Pages 203-228
Front Matter....Pages 229-229
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE....Pages 231-253
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro....Pages 254-283
Front Matter....Pages 285-285
Structural Evaluation by Generalized Integral Property....Pages 287-314
Cryptanalysis of SP Networks with Partial Non-Linear Layers....Pages 315-342
Front Matter....Pages 343-343
The Sum Can Be Weaker Than Each Part....Pages 345-367
SPHINCS: Practical Stateless Hash-Based Signatures....Pages 368-397
Front Matter....Pages 399-399
Making Masking Security Proofs Concrete....Pages 401-429
Ciphers for MPC and FHE....Pages 430-454
Front Matter....Pages 455-455
Verified Proofs of Higher-Order Masking....Pages 457-485
Inner Product Masking Revisited....Pages 486-510
Front Matter....Pages 511-511
Fully Homomophic Encryption over the Integers Revisited....Pages 513-536
Front Matter....Pages 511-511
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces....Pages 537-555
Front Matter....Pages 557-557
KDM-CCA Security from RKA Secure Authenticated Encryption....Pages 559-583
On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks....Pages 584-613
Front Matter....Pages 615-615
FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second....Pages 617-640
Bootstrapping for HElib ....Pages 641-670
Front Matter....Pages 671-671
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries....Pages 673-701
How to Efficiently Evaluate RAM Programs with Malicious Security....Pages 702-729
Front Matter....Pages 731-731
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function....Pages 733-761
Twisted Polynomials and Forgery Attacks on GCM....Pages 762-786
Front Matter....Pages 787-787
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices....Pages 789-815
Back Matter....Pages 817-818