Advances in Cryptology – CRYPTO 2011

31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings

  • Phillip Rogaway
Conference proceedings CRYPTO 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6841)

Table of contents

  1. Front Matter
  2. Randomness and Its Use

    1. Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert et al.
      Pages 1-20
    2. Paul Baecher, Marc Fischlin
      Pages 21-38
    3. Mohammad Mahmoody, Tal Moran, Salil Vadhan
      Pages 39-50
    4. Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
      Pages 51-70
  3. Computer-Assisted Cryptographic Proofs

    1. Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella Béguelin
      Pages 71-90
  4. Outsourcing and Delegating Computation

    1. Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
      Pages 91-110
    2. Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis
      Pages 111-131
    3. Shai Halevi, Yehuda Lindell, Benny Pinkas
      Pages 132-150
    4. Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz
      Pages 151-168
  5. Symmetric Cryptanalysis and Constructions

    1. Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque
      Pages 169-187
    2. María Naya-Plasencia
      Pages 188-205
    3. Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner
      Pages 206-221
    4. Jian Guo, Thomas Peyrin, Axel Poschmann
      Pages 222-239
  6. Secure Computation

    1. Gilad Asharov, Yehuda Lindell, Tal Rabin
      Pages 240-258
    2. Yehuda Lindell, Eli Oxman, Benny Pinkas
      Pages 259-276
    3. Amos Beimel, Yehuda Lindell, Eran Omri, Ilan Orlov
      Pages 277-296
  7. Leakage and Side Channels

    1. Sanjam Garg, Abhishek Jain, Amit Sahai
      Pages 297-315
    2. Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
      Pages 335-353
    3. Nicolas Veyrat-Charvillon, François-Xavier Standaert
      Pages 354-372
    4. Yael Tauman Kalai, Bhavana Kanukurthi, Amit Sahai
      Pages 373-390
  8. Quantum Cryptography

    1. Gilles Brassard, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante, Louis Salvail
      Pages 391-410
    2. Sean Hallgren, Adam Smith, Fang Song
      Pages 411-428
    3. Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky et al.
      Pages 429-446
  9. Lattices and Knapsacks

    1. Guillaume Hanrot, Xavier Pujol, Damien Stehlé
      Pages 447-464
  10. Invited Talk

    1. Roger Dingledine
      Pages 485-486
  11. Public-Key Encryption

    1. Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi
      Pages 487-504
    2. Adam O’Neill, Chris Peikert, Brent Waters
      Pages 525-542
  12. Symmetric Schemes

    1. Jooyoung Lee, Martijn Stam, John Steinberger
      Pages 561-577
    2. Alexandra Boldyreva, Nathan Chenette, Adam O’Neill
      Pages 578-595
    3. Mihir Bellare, Sriram Keelveedhi
      Pages 610-629
  13. Signatures

    1. Sanjam Garg, Vanishree Rao, Amit Sahai, Dominique Schröder, Dominique Unruh
      Pages 630-648
    2. Masayuki Abe, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 649-666
  14. Oblivious Transfer and Secret Sharing

    1. Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, Jürg Wullschleger
      Pages 667-684
  15. Multivariate and Coding-Based Schemes

    1. Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari
      Pages 706-723
    2. Jintai Ding, Timothy J. Hodges
      Pages 724-742
    3. Daniel J. Bernstein, Tanja Lange, Christiane Peters
      Pages 743-760
    4. Hang Dinh, Cristopher Moore, Alexander Russell
      Pages 761-779
  16. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.


cryptanalysis cryptographic attacks cryptographic protocols cryptography digital signature schemes encryption multi-party computation

Editors and affiliations

  • Phillip Rogaway
    • 1
  1. 1.Computer ScienceUniversity of CaliforniaDavisUSA

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-22791-2
  • Online ISBN 978-3-642-22792-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software