Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8616)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: CRYPTO 2014.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (31 papers)
-
Symmetric Encryption and PRFs
-
Hash Functions
Other volumes
-
Advances in Cryptology – CRYPTO 2014
-
Advances in Cryptology – CRYPTO 2014
Keywords
- Diffie-Hellman key exchange
- cryptanalysis and other attacks
- cryptography
- elliptic curves
- formal methods and theory of security
- hash functions and message authentication codes
- homomorphic encryption
- information-theoretic techniques
- key management
- mathematical foundations of cryptography
- multi-party computation
- public key (asymmetric) techniques
- quantum cryptography
- security protocols
- side-channel attacks
- symmetric cryptography and hash functions
- algorithm analysis and problem complexity
About this book
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.
The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Cryptology -- CRYPTO 2014
Book Subtitle: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I
Editors: Juan A. Garay, Rosario Gennaro
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-44371-2
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2014 2014
Softcover ISBN: 978-3-662-44370-5Published: 25 July 2014
eBook ISBN: 978-3-662-44371-2Published: 14 July 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 574
Number of Illustrations: 52 b/w illustrations
Topics: Cryptology, Systems and Data Security, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science
Industry Sectors: Aerospace, Electronics, Engineering, Finance, Business & Banking, IT & Software, Law, Telecommunications