Skip to main content
  • Conference proceedings
  • © 2020

Advances in Cryptology – EUROCRYPT 2020

39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12106)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): EUROCRYPT: Annual International Conference on the Theory and Applications of Cryptographic Techniques

Conference proceedings info: EUROCRYPT 2020.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

    Pages i-xv
  2. Generic Models

    1. Front Matter

      Pages 1-1
    2. On the Memory-Tightness of Hashed ElGamal

      • Ashrujit Ghoshal, Stefano Tessaro
      Pages 33-62
    3. Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model

      • Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin
      Pages 63-95
    4. On Instantiating the Algebraic Group Model from Falsifiable Assumptions

      • Thomas Agrikola, Dennis Hofheinz, Julia Kastner
      Pages 96-126
  3. Secure Computation I

    1. Front Matter

      Pages 127-127
    2. Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era

      • Juan Garay, Aggelos Kiayias, Rafail M. Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas
      Pages 129-158
    3. Efficient Constructions for Almost-Everywhere Secure Computation

      • Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas
      Pages 159-183
    4. The Price of Active Security in Cryptographic Protocols

      • Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
      Pages 184-215
    5. Succinct Non-interactive Secure Computation

      • Andrew Morgan, Rafael Pass, Antigoni Polychroniadou
      Pages 216-245
  4. Quantum I

    1. Front Matter

      Pages 247-247
    2. Implementing Grover Oracles for Quantum Key Search on AES and LowMC

      • Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia
      Pages 280-310
    3. Optimal Merging in Quantum \(k\)-xor and k-sum Algorithms

      • María Naya-Plasencia, André Schrottenloher
      Pages 311-340
    4. On the Quantum Complexity of the Continuous Hidden Subgroup Problem

      • Koen de Boer, Léo Ducas, Serge Fehr
      Pages 341-370
  5. Foundations

    1. Front Matter

      Pages 371-371
    2. Formalizing Data Deletion in the Context of the Right to Be Forgotten

      • Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan
      Pages 373-402
    3. OptORAMa: Optimal Oblivious RAM

      • Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi
      Pages 403-432

About this book

The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic.

The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.

Editors and Affiliations

  • Équipe-projet COSMIQ, Inria, Paris, France

    Anne Canteaut

  • Computer Science Department, Technion, Haifa, Israel

    Yuval Ishai

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access