Advances in Cryptology – CRYPTO 2013

33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I

  • Ran Canetti
  • Juan A. Garay
Conference proceedings CRYPTO 2013

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8042)

Table of contents

  1. Front Matter
  2. Session 1: Lattices and FHE

    1. Jacob Alperin-Sheriff, Chris Peikert
      Pages 1-20
    2. Daniele Micciancio, Chris Peikert
      Pages 21-39
    3. Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky
      Pages 40-56
    4. Joël Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs
      Pages 57-74
  3. Invited Talk: Crypto Wars Part 2 Have Begun

    1. Session 2: Foundations of Hardness

      1. Salil Vadhan, Colin Jia Zheng
        Pages 93-110
      2. Andrej Bogdanov, Chin Ho Lee
        Pages 111-128
    2. Session 3: Cryptanalysis I

      1. Marc Stevens
        Pages 129-146
      2. Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg et al.
        Pages 147-164
      3. Bin Zhang, Chao Xu, Dengguo Feng
        Pages 165-182
    3. Session 4: Cryptanalysis II

      1. Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin
        Pages 183-203
      2. Céline Blondeau, Andrey Bogdanov, Gregor Leander
        Pages 204-221
      3. Anne Canteaut, María Naya-Plasencia, Bastien Vayssière
        Pages 222-240
    4. Session 5: MPC – New Directions

      1. Shashank Agrawal, Manoj Prabhakaran
        Pages 259-276
      2. Pavel Hubáček, Jesper Buus Nielsen, Alon Rosen
        Pages 277-297
      3. Vipul Goyal, Ilya Mironov, Omkant Pandey, Amit Sahai
        Pages 298-315
    5. Session 6: Leakage Resilience

      1. Elette Boyle, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Amit Sahai
        Pages 316-334
      2. François-Xavier Standaert, Olivier Pereira, Yu Yu
        Pages 335-352
    6. Session 7: Symmetric Encryption and PRFs

      1. David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner
        Pages 353-373
      2. Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev
        Pages 374-391
      3. Dan Boneh, Kevin Lewi, Hart Montgomery, Ananth Raghunathan
        Pages 410-428
    7. Session 8: Key Exchange

      1. Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee
        Pages 429-448
      2. Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
        Pages 449-475
    8. Session 9: Multi Linear Maps

      1. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
        Pages 476-493
      2. Susan Hohenberger, Amit Sahai, Brent Waters
        Pages 494-512
      3. Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks
        Pages 513-530
    9. Session 10: Ideal Ciphers

      1. Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger
        Pages 531-550
      2. Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy
        Pages 571-588
  4. Back Matter

Other volumes

  1. Advances in Cryptology – CRYPTO 2013
    33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I
  2. 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II

About these proceedings


The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.


Diffie-Hellman key exchange homomorphic encryption multi-party computation security protocols side-channel attacks

Editors and affiliations

  • Ran Canetti
    • 1
  • Juan A. Garay
    • 2
  1. 1.Boston University and Tel Aviv UniversityBostonUSA
  2. 2.AT&T Labs – ResearchFlorham ParkUSA

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2013 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-40040-7
  • Online ISBN 978-3-642-40041-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software