Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.

Author(s): Rosario Gennaro, Matthew Robshaw (eds.)
Series: Lecture Notes in Computer Science 9215
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2015

Language: English
Pages: XVIII, 787
Tags: Data Encryption; Systems and Data Security; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science

Front Matter....Pages I-XVIII
Front Matter....Pages 1-1
Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing....Pages 3-22
Coded-BKW: Solving LWE Using Lattice Codes....Pages 23-42
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices....Pages 43-62
Provably Weak Instances of Ring-LWE....Pages 63-92
Front Matter....Pages 93-93
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis....Pages 95-115
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure....Pages 116-140
Capacity and Data Complexity in Multidimensional Linear Attack....Pages 141-160
Observations on the SIMON Block Cipher Family....Pages 161-185
Front Matter....Pages 187-187
Tweaking Even-Mansour Ciphers....Pages 189-208
Multi-key Security: The Even-Mansour Construction Revisited....Pages 209-223
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations....Pages 224-243
Front Matter....Pages 245-245
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations ....Pages 247-266
New Multilinear Maps Over the Integers....Pages 267-286
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation....Pages 287-307
Indistinguishability Obfuscation from Compact Functional Encryption....Pages 308-326
Front Matter....Pages 327-327
Efficient Pseudorandom Functions via On-the-Fly Adaptation....Pages 329-350
The Iterated Random Permutation Problem with Applications to Cascade Encryption....Pages 351-367
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC....Pages 368-387
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security....Pages 388-409
Front Matter....Pages 411-411
Integral Cryptanalysis on Full MISTY1....Pages 413-432
Front Matter....Pages 411-411
New Attacks on Feistel Structures with Improved Memory Complexities....Pages 433-454
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes....Pages 455-474
Front Matter....Pages 475-490
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance ....Pages 491-491
Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More....Pages 493-517
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations....Pages 518-537
Front Matter....Pages 538-557
Cryptanalysis of the Co-ACD Assumption....Pages 559-559
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP....Pages 561-580
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees....Pages 581-600
Front Matter....Pages 601-620
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0....Pages 621-621
Cryptanalysis of Full Sprout....Pages 623-642
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE....Pages 643-662
Front Matter....Pages 663-682
Decaf: Eliminating Cofactors Through Point Compression....Pages 683-701
Actively Secure OT Extension with Optimal Overhead....Pages 703-703
Algebraic Decomposition for Probing Security....Pages 705-723
Consolidating Masking Schemes....Pages 724-741
Back Matter....Pages 742-763
....Pages 764-783