Advances in Cryptology -- EUROCRYPT 2015

34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I

  • Elisabeth Oswald
  • Marc Fischlin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9056)

Also part of the Security and Cryptology book sub series (LNSC, volume 9056)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Best Paper

    1. Front Matter
      Pages 1-1
    2. Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé
      Pages 3-12
  3. Honorable Mentions

    1. Front Matter
      Pages 13-13
    2. Viet Tung Hoang, Ted Krovetz, Phillip Rogaway
      Pages 15-44
  4. Random Number Generators

    1. Front Matter
      Pages 75-75
    2. Thomas Shrimpton, R. Seth Terashima
      Pages 77-100
    3. Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart
      Pages 101-126
  5. Number Field Sieve

    1. Front Matter
      Pages 127-127
    2. Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain
      Pages 129-155
  6. Algorithmic Cryptanalysis

    1. Front Matter
      Pages 171-171
    2. Alexandre Duc, Florian Tramèr, Serge Vaudenay
      Pages 173-202
  7. Symmetric Cryptanalysis I

  8. Symmetric Cryptanalysis II

    1. Front Matter
      Pages 285-285

Other volumes

  1. Advances in Cryptology -- EUROCRYPT 2015
    34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I
  2. 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II

About these proceedings

Introduction

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015.

The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.

Keywords

AES authenticated encryption cluster computing cryptanalysis deterministic encryption differential cryptanalysis hash functions ideal cipher interactive theorem proving lightweight cryptography linear cryptanalysis mapreduce meet-in-the-middle post-quantum cryptography provable security public key encryption secure multiparty computation security protocols vectorized implementation zero knowledge

Editors and affiliations

  • Elisabeth Oswald
    • 1
  • Marc Fischlin
    • 2
  1. 1.University of BristolBristolUnited Kingdom
  2. 2.Technische Universität DarmstadtDarmstadtGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-46800-5
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-46799-2
  • Online ISBN 978-3-662-46800-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace