EUROCRYPT 2014:
Elisabeth Oswald and Phong Q. Nguyen (Eds.):
Advances in Cryptology - EUROCRYPT 2014
33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques
Copenhagen,Denmark,
May 11-15, 2014
Proceedings.
Organizational Committee
Program Chairs : | Elisabeth Oswald and Phong Q. Nguyen | |
General Chairs : | Gregor Leander and Lars R. Knudsen |
Program Committee
Masayuki Abe |
Joël Alwen |
Zvika Brakerski |
David Cash |
Dario Catalano |
Jean-Sébastien Coron |
Serge Fehr |
Pierre-Alain Fouque |
Marc Joye |
Charanjit S. Jutla |
Alexander May |
Florian Mendel |
Ilya Mironov |
Payman Mohassel |
Shiho Moriai |
María Naya-Plasencia |
Adam O'Neill |
Rafael Pass |
Ludovic Perret |
Emmanuel Prouff |
Thomas Ristenpart |
Pankaj Rohatgi |
Mike Rosulek |
Hovav Shacham |
François-Xavier Standaert |
Ron Steinfeld |
Dominique Unruh |
Serge Vaudenay |
Frederik Vercauteren |
Ivan Visconti |
Lei Wang |
Bogdan Warinschi |
Stefan Wolf |
External Referees
-
Public-Key Cryptanalysis
-
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic
, 1-16,
Antoine Joux
,
Pierrick Gaudry
,
Emmanuel Thomè
,
Razvan Barbulescu
bib info -
Polynomial Time Attack on Wild McEliece over Quadratic Extensions
, 17-39,
Jean-Pierre Tillich
,
Ayoub Otmani
,
Alain Couvreur
bib info -
Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus
, 40-57,
Jean-Charles Faugére
,
Antoine Joux
,
Vanessa Vitse
,
Louise Huot
,
Guénaël Renault
bib info
-
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic
, 1-16,
Antoine Joux
,
Pierrick Gaudry
,
Emmanuel Thomè
,
Razvan Barbulescu
- Identity-based Encryption
-
Key Derivation and Quantum Computing
-
Key Derivation without Entropy Waste
, 93-110,
Krzysztof Pietrzak
,
Yevgeniy Dodis
,
Daniel Wichs
bib info -
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits
, 111-128,
Daniel Wichs
,
Sebastian Faust
,
Daniele Venturi
,
Pratyay Mukherjee
bib info -
Revocable Quantum Timed-Release Encryption
, 129-146,
Dominique Unruh
bib info
-
Key Derivation without Entropy Waste
, 93-110,
Krzysztof Pietrzak
,
Yevgeniy Dodis
,
Daniel Wichs
-
Secret-Key Analysis and Implementations
-
Generic Universal Forgery Attack on Iterative Hash-Based MACs
, 147-164,
Thomas Peyrin
,
Lei Wang
bib info -
Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
, 165-182,
Kaisa Nyberg
,
Cèline Blondeau
bib info -
Faster Compact Diffie-Hellman: Endomorphisms on the x-line
, 183-200,
Benjamin Smith
,
Craig Costello
,
Hüseyin Hisil
bib info
-
Generic Universal Forgery Attack on Iterative Hash-Based MACs
, 147-164,
Thomas Peyrin
,
Lei Wang
-
Obfuscation and Multilinear Maps
-
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
, 201-220,
Susan Hohenberger
,
Amit Sahai
,
Brent Waters
bib info -
Protecting Obfuscation against Algebraic Attacks
, 221-238,
Amit Sahai
,
Boaz Barak
,
Yael Tauman Kalai
,
Sanjam Garg
,
Omer Paneth
bib info -
GGHLite: More Efficient Multilinear Maps from Ideal Lattices
, 239-256,
Ron Steinfeld
,
Damien Stehlè
,
Adeline Langlois
bib info
-
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
, 201-220,
Susan Hohenberger
,
Amit Sahai
,
Brent Waters
- Authenticated Encryption
-
Symmetric Encryption
-
Honey Encryption: Security Beyond the Brute-Force Bound
, 293-310,
Thomas Ristenpart
,
Ari Juels
bib info -
Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time
, 311-326,
Phillip Rogaway
,
Ben Morris
bib info -
Tight Security Bounds for Key-Alternating Ciphers
, 327-350,
John P. Steinberger
,
Shan Chen
bib info -
The Locality of Searchable Symmetric Encryption
, 351-368,
Stefano Tessaro
,
David Cash
bib info
-
Honey Encryption: Security Beyond the Brute-Force Bound
, 293-310,
Thomas Ristenpart
,
Ari Juels
-
Multi-Party Computation
-
A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing
, 369-386,
Himanshu Tyagi
,
Shun Watanabe
bib info -
Non-Interactive Secure Computation Based on Cut-and-Choose
, 387-404,
Benny Pinkas
,
Payman Mohassel
,
Ben Riva
,
Arash Afshar
bib info -
Garbled RAM Revisited
, 405-422,
Shai Halevi
,
Rafail Ostrovsky
,
Craig Gentry
,
Steve Lu
,
Daniel Wichs
,
Mariana Raykova
bib info
-
A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing
, 369-386,
Himanshu Tyagi
,
Shun Watanabe
-
Side-Channel Attacks
-
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
, 423-440,
Stefan Dziembowski
,
Sebastian Faust
,
Alexandre Duc
bib info -
Higher Order Masking of Look-Up Tables
, 441-458,
Jean-Sèbastien Coron
bib info -
How to Certify the Leakage of a Chip?
, 459-476,
François-Xavier Standaert
,
Nicolas Veyrat-Charvillon
,
François Durvaux
bib info
-
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
, 423-440,
Stefan Dziembowski
,
Sebastian Faust
,
Alexandre Duc
-
Signatures and Public-Key Encryption
-
Efficient Round Optimal Blind Signatures
, 477-495,
Sanjam Garg
,
Divya Gupta
bib info -
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
, 496-513,
Mihir Bellare
,
Sarah Meiklejohn
,
Susan Thomson
bib info -
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
, 514-532,
Benoît Libert
,
Moti Yung
,
Marc Joye
,
Thomas Peters
bib info
-
Efficient Round Optimal Blind Signatures
, 477-495,
Sanjam Garg
,
Divya Gupta
-
Functional Encryption
-
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
, 533-556,
Dan Boneh
,
Shai Halevi
,
Craig Gentry
,
Vinod Vaikuntanathan
,
Gil Segev
,
Sergey Gorbunov
,
Valeria Nikolaenko
,
Dhinakaran Vinayagamurthy
bib info -
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
, 557-577,
Nuttapong Attrapadung
bib info -
Multi-input Functional Encryption
, 578-602,
Jonathan Katz
,
Vipul Goyal
,
Amit Sahai
,
Shafi Goldwasser
,
Hong-Sheng Zhou
,
S. Dov Gordon
,
Elaine Shi
,
Feng-Hao Liu
,
Abhishek Jain
bib info
-
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
, 533-556,
Dan Boneh
,
Shai Halevi
,
Craig Gentry
,
Vinod Vaikuntanathan
,
Gil Segev
,
Sergey Gorbunov
,
Valeria Nikolaenko
,
Dhinakaran Vinayagamurthy
- Foundations
-
Multi-Party Computation
-
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation
, 659-676,
Amit Sahai
,
Manoj Prabhakaran
,
Hemanta K. Maji
,
Daniel Kraschewski
bib info -
On the Complexity of UC Commitments
, 677-694,
Yuval Ishai
,
Hoeteck Wee
,
Juan A. Garay
,
Ranjit Kumaresan
bib info -
Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption
, 695-712,
Ivan Damgård
,
Morten Dahl
bib info
-
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation
, 659-676,
Amit Sahai
,
Manoj Prabhakaran
,
Hemanta K. Maji
,
Daniel Kraschewski
Author Index