Advances in Cryptology – CRYPTO 2018

38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I

  • Hovav Shacham
  • Alexandra Boldyreva
Conference proceedings CRYPTO 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10991)

Also part of the Security and Cryptology book sub series (LNSC, volume 10991)

Table of contents

  1. Front Matter
    Pages I-XXIII
  2. Secure Messaging

    1. Front Matter
      Pages 1-1
    2. Bertram Poettering, Paul Rösler
      Pages 3-32
  3. Implementations and Physical Attacks Prevention

    1. Front Matter
      Pages 91-91
    2. Shai Halevi, Victor Shoup
      Pages 93-120
    3. Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov et al.
      Pages 121-151
  4. Authenticated and Format-Preserving Encryption

    1. Front Matter
      Pages 153-153
    2. Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage
      Pages 155-186
    3. Manuel Barbosa, Pooya Farshim
      Pages 187-220
    4. Viet Tung Hoang, Stefano Tessaro, Ni Trieu
      Pages 221-251
  5. Cryptoanalysis

    1. Front Matter
      Pages 253-253
    2. Adi Ben-Zvi, Arkadius Kalka, Boaz Tsaban
      Pages 255-274
    3. Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
      Pages 275-305
    4. Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras
      Pages 306-336
  6. Searchable Encryption and Differential Privacy

    1. Front Matter
      Pages 337-337
    2. Seny Kamara, Tarik Moataz, Olya Ohrimenko
      Pages 339-370
    3. Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou
      Pages 371-406
    4. Gilad Asharov, Gil Segev, Ido Shahaf
      Pages 407-436
    5. Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Daniel Wichs
      Pages 437-466
    6. Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters
      Pages 467-497
  7. Secret Sharing

    1. Front Matter
      Pages 499-499
    2. Vipul Goyal, Ashutosh Kumar
      Pages 501-530
    3. Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin
      Pages 531-561
  8. Encryption

    1. Front Matter
      Pages 563-563
    2. Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen et al.
      Pages 565-596
    3. Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
      Pages 597-627
  9. Symmetric Cryptography

    1. Front Matter
      Pages 629-629
    2. Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda
      Pages 631-661
    3. Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List et al.
      Pages 662-692
    4. Sandro Coretti, Yevgeniy Dodis, Siyao Guo
      Pages 693-721
    5. Benoît Cogliati, Yevgeniy Dodis, Jonathan Katz, Jooyoung Lee, John Steinberger, Aishwarya Thiruvengadam et al.
      Pages 722-753
  10. Proofs of Work and Proofs of Stake

    1. Front Matter
      Pages 755-755
    2. Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch
      Pages 757-788
    3. Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
      Pages 789-819
  11. Back Matter
    Pages 821-823

Other volumes

  1. Advances in Cryptology – CRYPTO 2018
    38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I
  2. 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II
  3. 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III

About these proceedings


The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.


cryptography key management public key (asymmetric) techniques digital signatures public key encryption symmetric cryptography and hash functions block and stream ciphers cryptanalysis and other attacks information-theoretic techniques mathematical foundations of cryptography data security encryption authentication publich key cryptography privacy privacy preserving software engineering block ciphers hash functions electronic document identification systems

Editors and affiliations

  • Hovav Shacham
    • 1
  • Alexandra Boldyreva
    • 2
  1. 1.The University of Texas at AustinAustinUSA
  2. 2.Georgia Institute of TechnologyAtlantaUSA

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-96883-4
  • Online ISBN 978-3-319-96884-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software