Skip to main content
  • Conference proceedings
  • © 2014

Advances in Cryptology -- CRYPTO 2014

34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8617)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

  2. Foundations of Hardness

    1. How to Eat Your Entropy and Have It Too – Optimal Recovery Strategies for Compromised RNGs

      • Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs
      Pages 37-54
    2. Cryptography with Streaming Algorithms

      • Periklis A. Papakonstantinou, Guang Yang
      Pages 55-70
  3. Obfuscation II

    1. The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator

      • Nir Bitansky, Ran Canetti, Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai, Omer Paneth et al.
      Pages 71-89
    2. Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications

      • Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
      Pages 90-107
    3. On Virtual Grey Box Obfuscation for General Circuits

      • Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth
      Pages 108-125
  4. Number-Theoretic Hardness

    1. Breaking ‘128-bit Secure’ Supersingular Binary Curves

      • Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
      Pages 126-145
  5. Side Channels and Leakage Resilience II

    1. Leakage-Tolerant Computation with Input-Independent Preprocessing

      • Nir Bitansky, Dana Dachman-Soled, Huijia Lin
      Pages 146-163
    2. Interactive Proofs under Continual Memory Leakage

      • Prabhanjan Ananth, Vipul Goyal, Omkant Pandey
      Pages 164-182
  6. Information-Theoretic Security

    1. Amplifying Privacy in Privacy Amplification

      • Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin
      Pages 183-198
    2. On the Communication Complexity of Secure Computation

      • Deepesh Data, Manoj M. Prabhakaran, Vinod M. Prabhakaran
      Pages 199-216
    3. Optimal Non-perfect Uniform Secret Sharing Schemes

      • Oriol Farràs, Torben Hansen, Tarik Kaced, Carles Padró
      Pages 217-234
  7. Key Exchange and Secure Communication

    1. Proving the TLS Handshake Secure (As It Is)

      • Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella-Béguelin
      Pages 235-255
    2. Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment

      • Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
      Pages 256-275
  8. Zero Knowledge

    1. Scalable Zero Knowledge via Cycles of Elliptic Curves

      • Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
      Pages 276-294
    2. Physical Zero-Knowledge Proofs of Physical Properties

      • Ben Fisch, Daniel Freund, Moni Naor
      Pages 313-336
  9. Composable Security

Other Volumes

  1. Advances in Cryptology – CRYPTO 2014

About this book

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.

The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.

Editors and Affiliations

  • Yahoo Labs, Sunnyvale, USA

    Juan A. Garay

  • The City College of New York, New York, USA

    Rosario Gennaro

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access