Advertisement

Advances in Cryptology – EUROCRYPT 2018

37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III

  • Jesper Buus Nielsen
  • Vincent Rijmen
Conference proceedings EUROCRYPT 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10822)

Also part of the Security and Cryptology book sub series (LNSC, volume 10822)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Zero-Knowledge

    1. Front Matter
      Pages 1-1
    2. Nils Fleischhacker, Vipul Goyal, Abhishek Jain
      Pages 3-33
    3. Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
      Pages 34-65
  3. Implementing Multiparty Computation

    1. Front Matter
      Pages 89-89
    2. Marcel Keller, Avishay Yanai
      Pages 91-124
    3. Benny Pinkas, Thomas Schneider, Christian Weinert, Udi Wieder
      Pages 125-157
    4. Marcel Keller, Valerio Pastro, Dragos Rotaru
      Pages 158-189
  4. Non-interactive Zero-Knowledge

    1. Front Matter
      Pages 191-191
    2. Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
      Pages 222-255
  5. Anonymous Communication

    1. Front Matter
      Pages 257-257
    2. Jean Paul Degabriele, Martijn Stam
      Pages 259-293
    3. Marshall Ball, Elette Boyle, Tal Malkin, Tal Moran
      Pages 294-325
  6. Isogeny

    1. Front Matter
      Pages 327-327
    2. Kirsten Eisenträger, Sean Hallgren, Kristin Lauter, Travis Morrison, Christophe Petit
      Pages 329-368
  7. Leakage

    1. Front Matter
      Pages 369-369
    2. Yi-Hsiu Chen, Kai-Min Chung, Jyun-Jie Liao
      Pages 371-390
  8. Key Exchange

    1. Front Matter
      Pages 391-391
    2. Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov
      Pages 393-424
    3. David Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks
      Pages 425-455
    4. Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
      Pages 456-486
  9. Quantum

    1. Front Matter
      Pages 487-487
    2. Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
      Pages 489-519
    3. Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa
      Pages 520-551
    4. Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
      Pages 552-586
  10. Non-maleable Codes

    1. Front Matter
      Pages 587-587
    2. Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
      Pages 589-617
  11. Provable Symmetric Cryptography

    1. Front Matter
      Pages 651-651
    2. Pratik Soni, Stefano Tessaro
      Pages 653-684
    3. Anja Lehmann, Björn Tackmann
      Pages 685-716
  12. Back Matter
    Pages 717-719

Other volumes

  1. 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I
  2. 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II
  3. Advances in Cryptology – EUROCRYPT 2018
    37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III

About these proceedings

Introduction

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.

The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography. 

Keywords

artificial intelligence authentication case based reasoning ciphertexts cryptanalysis cryptocurrencies cryptographic primitives cryptography data mining data privacy electronic document identification systems fuzzy sets homomorphic encryption knowledge based systems multiparty computation privacy preserving public key cryptography side-channel attacks software engineering symmetric-key encryption

Editors and affiliations

  • Jesper Buus Nielsen
    • 1
  • Vincent Rijmen
    • 2
  1. 1.Aarhus UniversityAarhusDenmark
  2. 2.University of LeuvenLeuvenBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-78372-7
  • Copyright Information International Association for Cryptologic Research 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-78371-0
  • Online ISBN 978-3-319-78372-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace