Skip to main content
  • Conference proceedings
  • © 2014

Advances in Cryptology -- CRYPTO 2014

34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8616)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

  2. Symmetric Encryption and PRFs

    1. Security of Symmetric Encryption against Mass Surveillance

      • Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway
      Pages 1-19
    2. The Security of Multiple Encryption in the Ideal Cipher Model

      • Yuanxi Dai, Jooyoung Lee, Bart Mennink, John Steinberger
      Pages 20-38
    3. Minimizing the Two-Round Even-Mansour Cipher

      • Shan Chen, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John Steinberger
      Pages 39-56
    4. Block Ciphers – Focus on the Linear Layer (feat. PRIDE)

      • Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçın
      Pages 57-76
    5. Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

      • Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson
      Pages 77-94
  3. Formal Methods

    1. Automated Analysis of Cryptographic Assumptions in Generic Group Models

      • Gilles Barthe, Edvard Fagerholm, Dario Fiore, John Mitchell, Andre Scedrov, Benedikt Schmidt
      Pages 95-112
  4. Hash Functions

    1. The Exact PRF-Security of NMAC and HMAC

      • Peter Gaži, Krzysztof Pietrzak, Michal Rybár
      Pages 113-130
    2. Updates on Generic Attacks against HMAC and NMAC

      • Jian Guo, Thomas Peyrin, Yu Sasaki, Lei Wang
      Pages 131-148
    3. Improved Generic Attacks against Hash-Based MACs and HAIFA

      • Itai Dinur, Gaëtan Leurent
      Pages 149-168
    4. Cryptography from Compression Functions: The UCE Bridge to the ROM

      • Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
      Pages 169-187
    5. Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources

      • Christina Brzuska, Pooya Farshim, Arno Mittelbach
      Pages 188-205
  5. Groups and Maps

    1. Low Overhead Broadcast Encryption from Multilinear Maps

      • Dan Boneh, Brent Waters, Mark Zhandry
      Pages 206-223
    2. Security Analysis of Multilinear Maps over the Integers

      • Hyung Tae Lee, Jae Hong Seo
      Pages 224-240
    3. Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups

      • Masayuki Abe, Jens Groth, Miyako Ohkubo, Takeya Tango
      Pages 241-260
    4. Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations

      • Gottfried Herold, Julia Hesse, Dennis Hofheinz, Carla Ràfols, Andy Rupp
      Pages 261-279
  6. Lattices

    1. Revisiting the Gentry-Szydlo Algorithm

      • H. W. Lenstra, A. Silverberg
      Pages 280-296
    2. Faster Bootstrapping with Polynomial Error

      • Jacob Alperin-Sheriff, Chris Peikert
      Pages 297-314
    3. Hardness of k-LWE and Applications in Traitor Tracing

      • San Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld
      Pages 315-334
    4. Improved Short Lattice Signatures in the Standard Model

      • Léo Ducas, Daniele Micciancio
      Pages 335-352

Other Volumes

  1. Advances in Cryptology – CRYPTO 2014

About this book

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.

The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.

Editors and Affiliations

  • Yahoo Labs, Sunnyvale, USA

    Juan A. Garay

  • The City College of New York, New York, USA

    Rosario Gennaro

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access