CRYPTO 2013:
Juan A. Garay and Ran Canetti (Eds.):
Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference
Santa Barbara, CA, USA,
August 18-22, 2013
Proceedings.
CRYPTO 2013 Vol I
CRYPTO 2013 Vol II
Organizational Committee
Program Chairs : | Juan A. Garay and Ran Canetti | |
General Chair : | Helena Handschuh |
Program Committee
Masayuki Abe |
Mihir Bellare |
Zvika Brakerski |
Jan Camenisch |
David Cash |
Kai-Min Chung |
Jean-Sébastien Coron |
Dana Dachman-Soled |
Stefan Dziembowski |
Iftach Haitner |
Shai Halevi |
Goichiro Hanaoka |
Dennis Hofheinz |
Jonathan Katz |
Lars R. Knudsen |
Eyal Kushilevitz |
Kristin Lauter |
Huijia Lin |
Yehuda Lindell |
Vadim Lyubashevsky |
John C. Mitchell |
Tal Moran |
Jesper Buus Nielsen |
Christof Paar |
Manoj Prabhakaran |
Tal Rabin |
Charles Rackoff |
Christian Rechberger |
Thomas Ristenpart |
Guy N. Rothblum |
Christian Schaffner |
Hovav Shacham |
Vitaly Shmatikov |
Nigel P. Smart |
Adam Smith |
Martijn Stam |
John P. Steinberger |
Frederik Vercauteren |
Xiaoyun Wang |
Daniel Wichs |
External Referees
- Lattices and FHE
-
Practical Bootstrapping in Quasilinear Time
, 1-20,
Chris Peikert
,
Jacob Alperin-Sheriff
bib info , video -
Hardness of SIS and LWE with Small Parameters
, 21-39,
Daniele Micciancio
,
Chris Peikert
bib info , video -
Lattice Signatures and Bimodal Gaussians
, 40-56,
Vadim Lyubashevsky
,
Alain Durmus
,
Léo Ducas
,
Tancrède Lepoint
bib info -
Learning with Rounding, Revisited - New Reduction, Properties and Applications
, 57-74,
Joël Alwen
,
Krzysztof Pietrzak
,
Daniel Wichs
,
Stephan Krenn
bib info , video -
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
, 75-92,
Craig Gentry
,
Amit Sahai
,
Brent Waters
bib info , video - Invited Talk: Crypto Wars Part 2 Have Begun by Cindy Cohn
- Foundations of Hardness
-
A Uniform Min-Max Theorem with Applications in Cryptography
, 93-110,
Salil P. Vadhan
,
Colin Jia Zheng
bib info , video -
Limits of Provable Security for Homomorphic Encryption
, 111-128,
Andrej Bogdanov
,
Chin Ho Lee
bib info , video - Cryptanalysis I
-
Counter-cryptanalysis: reconstructing Flame's new variant collision attack
, 129-146,
Marc Stevens
bib info , video -
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
, 147-164,
Gregor Leander
,
Christof Paar
,
Timo Kasper
,
David Oswald
,
Daehyun Strobel
,
Benedikt Driessen
,
Falk Schellenberg
bib info -
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract)
, 165-182,
Bin Zhang
,
Dengguo Feng
,
Chao Xu
bib info , video - Cryptanalysis II
-
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
, 183-203,
Pierre-Alain Fouque
,
Thomas Peyrin
,
Jérémy Jean
bib info , video -
Bounds in Shallows and in Miseries
, 204-221,
Gregor Leander
,
Andrey Bogdanov
,
Céline Blondeau
bib info -
Sieve-in-the-Middle: Improved MITM Attacks
, 222-240,
Anne Canteaut
,
María Naya-Plasencia
,
Bastien Vayssière
bib info , video -
Construction of Differential Characteristics in ARX Designs Application to Skein
, 241-258,
Gaëtan Leurent
bib info , video - MPC --- New Directions
-
On Fair Exchange, Fair Coins and Fair Sampling
, 259-276,
Manoj Prabhakaran
,
Shashank Agrawal
bib info , video -
Limits on the Power of Cryptographic Cheap Talk
, 277-297,
Jesper Buus Nielsen
,
Alon Rosen
,
Pavel Hubácek
bib info , video -
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols
, 298-315,
Vipul Goyal
,
Amit Sahai
,
Ilya Mironov
,
Omkant Pandey
bib info , video - Leakage Resilience
-
Secure Computation against Adaptive Auxiliary Information
, 316-334,
Amit Sahai
,
Yael Tauman Kalai
,
Sanjam Garg
,
Abhishek Jain
,
Elette Boyle
bib info , video -
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
, 335-352,
François-Xavier Standaert
,
Olivier Pereira
,
Yu Yu
bib info , video - Symmetric Encryption and PRFs
-
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
, 353-373,
Stanislaw Jarecki
,
Charanjit S. Jutla
,
Hugo Krawczyk
,
Michael Steiner
,
David Cash
,
Marcel-Catalin Rosu
bib info , video -
Message-Locked Encryption for Lock-Dependent Messages
, 374-391,
Dan Boneh
,
Ilya Mironov
,
Martín Abadi
,
Gil Segev
,
Ananth Raghunathan
bib info -
The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries
(pdf not available), 392-409,
Thomas Ristenpart
,
Scott Yilek
bib info , video -
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
(pdf not available), 289-307,
Benoît Libert
,
Moti Yung
,
Marc Joye
,
Thomas Peters
bib info - Key Exchange
-
On the Security of the TLS Protocol: A Systematic Analysis
, 429-448,
Kenneth G. Paterson
,
Hugo Krawczyk
,
Hoeteck Wee
bib info -
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
, 449-475,
David Pointcheval
,
Damien Vergnaud
,
Céline Chevalier
,
Olivier Blazy
,
Fabrice Benhamouda
bib info , video - Multi Linear Maps
-
Practical Multilinear Maps over the Integers
, 476-493,
Jean-Sébastien Coron
,
Mehdi Tibouchi
,
Tancrède Lepoint
bib info , video -
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
, 494-512,
Susan Hohenberger
,
Amit Sahai
,
Brent Waters
bib info , video -
Programmable Hash Functions in the Multilinear Setting
(pdf not available), 513-530,
Kenneth G. Paterson
,
Dennis Hofheinz
,
Christoph Striecks
,
Eduarda S. V. Freire
bib info , video - Ideal Ciphers
-
On the Indifferentiability of Key-Alternating Ciphers
, 531-550,
Elena Andreeva
,
Andrey Bogdanov
,
Yevgeniy Dodis
,
John P. Steinberger
,
Bart Mennink
bib info , video -
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
, 551-570,
Peter Gaži
bib info , video -
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
(pdf not available), 571-588,
Mario Szegedy
,
Eike Kiltz
,
Krzysztof Pietrzak
bib info , video - Implementation-Oriented Protocols
-
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
, 1-17,
Yehuda Lindell
bib info , video -
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
, 18-35,
Jonathan Katz
,
Yan Huang
,
David Evans
bib info -
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation
, 36-53,
Payman Mohassel
,
Ben Riva
bib info -
Improved OT Extension for Transferring Short Secrets
, 54-70,
Vladimir Kolesnikov
,
Ranjit Kumaresan
bib info , video -
Time-Optimal Interactive Proofs for Circuit Evaluation
, 71-89,
Justin Thaler
bib info , video -
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
, 90-108,
Eran Tromer
,
Alessandro Chiesa
,
Eli Ben-Sasson
,
Daniel Genkin
,
Madars Virza
bib info , video - Invited Talk: Why the Web Still Runs on RC4 by Adam Langley
- Number-Theoretic Hardness
-
On the Function Field Sieve and the Impact of Higher Splitting Probabilities
, 109-128,
Robert Granger
,
Gary McGuire
,
Faruk Göložlu
,
Jens Zumbrägel
bib info -
An Algebraic Framework for Diffie-Hellman Assumptions
, 129-147,
Eike Kiltz
,
Carla Ràfols
,
Gottfried Herold
,
Alex Escala
,
Jorge Villar
bib info , video -
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
, 148-165,
Rosario Gennaro
,
William E. Skeith III
,
Nelly Fazio
,
Irippuge Milinda Perera
bib info , video - MPC --- Foundations
-
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
, 166-184,
Eyal Kushilevitz
,
Yuval Ishai
,
Brent Waters
,
Benny Applebaum
bib info , video -
Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract)
, 185-202,
Ivan Damgård
,
Yuval Ishai
,
Ran Raz
,
Peter Bro Miltersen
,
Ron D. Rothblum
,
Gil Cohen
,
Jonas Kölker
bib info , video -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
, 203-219,
Ueli M. Maurer
,
Martin Hirt
,
Christoph Lucas
bib info -
What Information Is Leaked under Concurrent Composition?
, 220-238,
Vipul Goyal
,
Abhishek Jain
,
Divya Gupta
bib info , video - Codes and Secret Sharing
-
Non-malleable Codes from Two-Source Extractors
, 239-257,
Stefan Dziembowski
,
Tomasz Kazana
,
Maciej Obremski
bib info , video -
Optimal Coding for Streaming Authentication and Interactive Communication
, 258-276,
Rafail Ostrovsky
,
Matthew K. Franklin
,
Ran Gelles
,
Leonard J. Schulman
bib info , video -
Secret Sharing, Rank Inequalities and Information Inequalities
, 277-288,
Sebastiàn Martín Molleví
,
Carles Padró
,
An Yang
bib info , video - Signatures and Authentication
-
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
, 289-307,
Benoît Libert
,
Moti Yung
,
Marc Joye
,
Thomas Peters
bib info -
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
, 308-325,
Vadim Lyubashevsky
,
Daniel Masny
bib info - Quantum Security
-
Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling
, 326-343,
Stephanie Wehner
,
Frédéric Dupuis
,
Omar Fawzi
bib info , video -
Quantum One-Time Programs - (Extended Abstract)
, 344-360,
Anne Broadbent
,
Douglas Stebila
,
Gus Gutoski
bib info , video -
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
, 361-379,
Dan Boneh
,
Mark Zhandry
bib info , video -
Everlasting Multi-party Computation
, 380-397,
Dominique Unruh
bib info , video - New Primitives
-
Instantiating Random Oracles via UCEs
, 398-415,
Mihir Bellare
,
Viet Tung Hoang
,
Sriram Keelveedhi
bib info , video -
Obfuscating Conjunctions
, 416-434,
Guy N. Rothblum
,
Zvika Brakerski
bib info - Functional Encryption I
-
Fully, (Almost) Tightly Secure IBE and Dual System Groups
, 435-460,
Hoeteck Wee
,
Jie Chen
bib info -
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
, 461-478,
Dan Boneh
,
Gil Segev
,
Ananth Raghunathan
bib info -
Attribute-Based Encryption for Circuits from Multilinear Maps
, 479-499,
Shai Halevi
,
Craig Gentry
,
Amit Sahai
,
Brent Waters
,
Sanjam Garg
bib info , video - Functional Encryption II
-
Functional Encryption: New Perspectives and Lower Bounds
, 500-518,
Vinod Vaikuntanathan
,
Hoeteck Wee
,
Shweta Agrawal
,
Sergey Gorbunov
bib info , video -
On the Achievability of Simulation-Based Security for Functional Encryption
, 519-535,
Giuseppe Persiano
,
Adam O'Neill
,
Abhishek Jain
,
Angelo De Caro
,
Vincenzo Iovino
,
Omer Paneth
bib info , video -
How to Run Turing Machines on Encrypted Data
, 536-553,
Vinod Vaikuntanathan
,
Shafi Goldwasser
,
Yael Tauman Kalai
,
Raluca A. Popa
,
Nickolai Zeldovich
bib info , video
Author Index