CRYPTO 2011:
Phillip Rogaway (Ed.):
Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference,
Santa Barbara, CA, USA,
August 14-18, 2011
Proceedings.
CRYPTO 2011
Organizational Committee
Program Chairs : | Phillip Rogaway | |
General Chair : | Thomas Shrimpton |
Program Committee
Masayuki Abe |
Michael Backes |
Paulo S. L. M. Barreto |
Mihir Bellare |
Alex Biryukov |
Dan Boneh |
Jung Hee Cheon |
Jean-Sébastien Coron |
Marten van Dijk |
Yevgeniy Dodis |
Orr Dunkelman |
Serge Fehr |
Steven D. Galbraith |
Craig Gentry |
Louis Goubin |
Vipul Goyal |
Aggelos Kiayias |
Eike Kiltz |
Anja Lehmann |
Arjen K. Lenstra |
Stefan Mangard |
Daniele Micciancio |
John C. Mitchell |
Tal Moran |
Chanathip Namprempre |
Phong Q. Nguyen |
Jesper Buus Nielsen |
Rafael Pass |
Kenneth G. Paterson |
Benny Pinkas |
Bart Preneel |
Leonid Reyzin |
Vincent Rijmen |
Reihaneh Safavi-Naini |
Andre Scedrov |
Adam Smith |
François-Xavier Standaert |
Stefano Tessaro |
Bogdan Warinschi |
Hoeteck Wee |
External Referees
-
Randomness and its Use
-
Leftover Hash Lemma, Revisited
, 1,
Boaz Barak
,
François-Xavier Standaert
,
Hugo Krawczyk
,
Krzysztof Pietrzak
,
Yevgeniy Dodis
,
Olivier Pereira
,
Yu Yu
bib info -
Random Oracle Reducibility
, 21,
Marc Fischlin
,
Paul Baecher
bib info -
Time-Lock Puzzles in the Random Oracle Model
, 39,
Tal Moran
,
Salil Vadhan
,
Mohammad Mahmoody
bib info -
Physically Uncloneable Functions in the Universal Composition Framework
, 51,
Marc Fischlin
,
Stefan Katzenbeisser
,
Christina Brzuska
,
Heike Schröder
bib info
-
Leftover Hash Lemma, Revisited
, 1,
Boaz Barak
,
François-Xavier Standaert
,
Hugo Krawczyk
,
Krzysztof Pietrzak
,
Yevgeniy Dodis
,
Olivier Pereira
,
Yu Yu
- Computer-Assisted Cryptographic Proofs
-
Outsourcing and Delegating Computation
-
Optimal Verification of Operations on Dynamic Sets
, 91,
Roberto Tamassia
,
Nikos Triandopoulos
,
Charalampos Papamanthou
bib info -
Verifiable Delegation of Computation over Large Datasets
, 110,
Rosario Gennaro
,
Yevgeniy Vahlis
,
Siavosh Benabbas
bib info NULL -
Secure Computation on the Web: Computing without Simultaneous Interaction
, 128,
Shai Halevi
,
Benny Pinkas
,
Yehuda Lindell
bib info -
Memory Delegation
, 147,
Yael Kalai
,
Ran Raz
,
Kai-Min Chung
,
Feng-Hao Liu
bib info
-
Optimal Verification of Operations on Dynamic Sets
, 91,
Roberto Tamassia
,
Nikos Triandopoulos
,
Charalampos Papamanthou
-
Symmetric Cryptanalysis and Constructions
-
Automatic Search of Attacks on Round-Reduced AES and Applications
, 165,
Pierre-Alain Fouque
,
Charles Bouillaguet
,
Patrick Derbez
bib info -
How to Improve Rebound Attacks
, 184,
María Naya-Plasencia
bib info -
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
, 202,
Gregor Leander
,
Erik Zenner
,
Mohamed Ahmed Abdelraheem
,
Hoda AlKhzaimi
bib info -
The PHOTON Family of Lightweight Hash Functions
, 219,
Thomas Peyrin
,
Axel Poschmann
,
Jian Guo
bib info
-
Automatic Search of Attacks on Round-Reduced AES and Applications
, 165,
Pierre-Alain Fouque
,
Charles Bouillaguet
,
Patrick Derbez
-
Secure Computation
-
Perfectly-Secure Multiplication for any
t<n/3
, 237,
Yehuda Lindell
,
Tal Rabin
,
Gilad Asharov
bib info -
The IPS Compiler: Optimizations, Variants and Concrete Efficiency
, 255,
Benny Pinkas
,
Yehuda Lindell
,
Eli Oxman
bib info -
1/p
-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds
, 273,
Yehuda Lindell
,
Amos Beimel
,
Eran Omri
,
Ilan Orlov
bib info
-
Perfectly-Secure Multiplication for any
t<n/3
, 237,
Yehuda Lindell
,
Tal Rabin
,
Gilad Asharov
-
Leakage and Side Channels
-
Leakage-Resilient Zero Knowledge
, 293,
Amit Sahai
,
Sanjam Garg
,
Abhishek Jain
bib info -
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework
, 311,
Elisabeth Oswald
,
Carolyn Whitnall
bib info -
Key-Evolution Schemes Resilient to Space-Bounded Leakage
, 330,
Stefan Dziembowski
,
Daniel Wichs
,
Tomasz Kazana
bib info -
Generic Side-Channel Distinguishers: Improvements and Limitations
, 348,
Francçois-Xavier Standaert
,
Nicolas Veyrat-Charvillon
bib info -
Cryptography with Tamperable and Leaky Memory
, 367,
Amit Sahai
,
Yael Tauman Kalai
,
Bhavana Kanukurthi
bib info
-
Leakage-Resilient Zero Knowledge
, 293,
Amit Sahai
,
Sanjam Garg
,
Abhishek Jain
-
Quantum Cryptography
-
Merkle Puzzles in a Quantum World
, 385,
Gilles Brassard
,
Louis Salvail
,
Peter Høyer
,
Kassem Kalach
,
Marc Kaplan
,
Sophie Laplante
bib info -
Classical Cryptographic Protocols in a Quantum World
, 405,
Adam Smith
,
Sean Hallgren
,
Fang Song
bib info -
Position-Based Quantum Cryptography: Impossibility and Constructions
, 423,
Serge Fehr
,
Rafail Ostrovsky
,
Vipul Goyal
,
Christian Schaffner
,
Nishanth Chandran
,
Ran Gelles
,
Harry Buhrman
bib info
-
Merkle Puzzles in a Quantum World
, 385,
Gilles Brassard
,
Louis Salvail
,
Peter Høyer
,
Kassem Kalach
,
Marc Kaplan
,
Sophie Laplante
- Lattices and Knapsacks
- Invited talk: Tor and Circumvention: Lessons Learned
-
Public-Key Encryption
-
Fully Homomorphic Encryption over the Integers with Shorter Public Keys
, 483,
Jean-Sébastien Coron
,
David Naccache
,
Avradip Mandal
,
Mehdi Tibouchi
bib info -
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
, 501,
Vinod Vaikuntanathan
,
Zvika Brakerski
bib info -
Bi-Deniable Public-Key Encryption
, 521,
Chris Peikert
,
Brent Waters
,
Adam O'Neill
bib info -
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
, 539,
Gil Segev
,
Zvika Brakerski
bib info
-
Fully Homomorphic Encryption over the Integers with Shorter Public Keys
, 483,
Jean-Sébastien Coron
,
David Naccache
,
Avradip Mandal
,
Mehdi Tibouchi
-
Symmetric Schemes
-
The Collision Security of Tandem-DM in the Ideal Cipher Model
, 557,
Martijn Stam
,
Joojoung Lee
,
John Steinberger
bib info -
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
, 575,
Alexandra Boldyreva
,
Adam O'Neill
,
Nathan Chenette
bib info -
A New Variant of PMAC: Beyond the Birthday Bound
, 593,
Kan Yasuda
bib info -
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
, 607,
Mihir Bellare
,
Sriram Keelveedhi
bib info
-
The Collision Security of Tandem-DM in the Ideal Cipher Model
, 557,
Martijn Stam
,
Joojoung Lee
,
John Steinberger
-
Signatures
-
Round Optimal Blind Signatures in the Standard Model
, 627,
Amit Sahai
,
Dominique Unruh
,
Sanjam Garg
,
Dominique Schröder
,
Vanishree Rao
bib info -
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
, 646,
Masayuki Abe
,
Miyako Ohkubo
,
Jens Groth
,
Kristiyan Haralambiev
bib info
-
Round Optimal Blind Signatures in the Standard Model
, 627,
Amit Sahai
,
Dominique Unruh
,
Sanjam Garg
,
Dominique Schröder
,
Vanishree Rao
-
Oblivious Transfer and Secret Sharing
-
Constant-Rate Oblivious Transfer from Noisy Channels
, 664,
Rafail Ostrovsky
,
Amit Sahai
,
Eyal Kushilevitz
,
Yuval Ishai
,
Jörg Wullschleger
,
Manoj Prabhakaran
bib info -
The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing
, 682,
Ronald Cramer
,
Chaoping Xing
,
Ignacio Cascudo
bib info
-
Constant-Rate Oblivious Transfer from Noisy Channels
, 664,
Rafail Ostrovsky
,
Amit Sahai
,
Eyal Kushilevitz
,
Yuval Ishai
,
Jörg Wullschleger
,
Manoj Prabhakaran
-
Multivariate and Coding-Based Schemes
-
Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
, 703,
Taizo Shirai
,
Koichi Sakumoto
,
Harunaga Hiwatari
bib info -
Inverting HFE Systems is Quasi-Polynomial for All Fields
, 721,
Jintai Ding
,
Timothy Hodges
bib info -
Smaller Decoding Exponents: Ball-Collision Decoding
, 740,
Daniel J. Bernstein
,
Tanja Lange
,
Christiane Peters
bib info -
McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks
, 758,
Alexander Russell
,
Hang Dinh
,
Cristopher Moore
bib info
-
Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
, 703,
Taizo Shirai
,
Koichi Sakumoto
,
Harunaga Hiwatari
Author Index