Advances in Cryptology – EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.

Author(s): Marc Fischlin, Jean-Sébastien Coron (eds.)
Series: Lecture Notes in Computer Science 9665
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2016

Language: English
Pages: XXVIII, 853
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Systems and Data Security; Management of Computing and Information Systems; Discrete Mathematics in Computer Science

Front Matter....Pages I-XXVIII
Tightly CCA-Secure Encryption Without Pairings....Pages 1-27
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes....Pages 28-57
Essentially Optimal Robust Secret Sharing with Maximal Corruptions....Pages 58-86
Provably Robust Sponge-Based PRNGs and KDFs....Pages 87-116
Reusable Fuzzy Extractors for Low-Entropy Distributions....Pages 117-146
Provably Weak Instances of Ring-LWE Revisited....Pages 147-167
Faster Algorithms for Solving LPN....Pages 168-195
Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis....Pages 196-213
Polytopic Cryptanalysis....Pages 214-239
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces....Pages 240-262
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption....Pages 263-293
Sanitization of FHE Ciphertexts....Pages 294-310
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts....Pages 311-343
Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning....Pages 344-371
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1....Pages 372-402
Complete Addition Formulas for Prime Order Elliptic Curves....Pages 403-428
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields....Pages 429-458
Freestart Collision for Full SHA-1....Pages 459-483
New Attacks on the Concatenation and XOR Hash Combiners....Pages 484-508
Cryptanalysis of the New CLT Multilinear Map over the Integers....Pages 509-536
Cryptanalysis of GGH Map....Pages 537-565
Hash-Function Based PRFs: AMAC and Its Multi-User Security....Pages 566-595
On the Influence of Message Length in PMAC’s Security Bounds....Pages 596-621
Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS....Pages 622-643
An Analysis of OpenSSL’s Random Number Generator....Pages 644-669
Safely Exporting Keys from Secure Channels....Pages 670-698
Valiant’s Universal Circuit is Practical....Pages 699-728
Nonce-Based Cryptography: Retaining Security When Randomness Fails....Pages 729-757
Honey Encryption Beyond Message Recovery Security....Pages 758-788
Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator....Pages 789-819
Practical, Predictable Lattice Basis Reduction....Pages 820-849
Back Matter....Pages 851-853