Skip to main content
  • Conference proceedings
  • © 2014

Advances in Cryptology – EUROCRYPT 2014

33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8441)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): EUROCRYPT: Annual International Conference on the Theory and Applications of Cryptographic Techniques

Conference proceedings info: EUROCRYPT 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Front Matter

  2. Public-Key Cryptanalysis

    1. A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic

      • Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé
      Pages 1-16
    2. Polynomial Time Attack on Wild McEliece over Quadratic Extensions

      • Alain Couvreur, Ayoub Otmani, Jean–Pierre Tillich
      Pages 17-39
    3. Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus

      • Jean-Charles Faugère, Louise Huot, Antoine Joux, Guénaël Renault, Vanessa Vitse
      Pages 40-57
  3. Identity-Based Encryption

    1. Why Proving HIBE Systems Secure Is Difficult

      • Allison Lewko, Brent Waters
      Pages 58-76
    2. Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack

      • Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
      Pages 77-92
  4. Key Derivation and Quantum Computing

    1. Key Derivation without Entropy Waste

      • Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
      Pages 93-110
    2. Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits

      • Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs
      Pages 111-128
    3. Revocable Quantum Timed-Release Encryption

      • Dominique Unruh
      Pages 129-146
  5. Secret-Key Analysis and Implementations

    1. Faster Compact Diffie–Hellman: Endomorphisms on the x-line

      • Craig Costello, Huseyin Hisil, Benjamin Smith
      Pages 183-200
  6. Obfuscation and Multilinear Maps

    1. Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation

      • Susan Hohenberger, Amit Sahai, Brent Waters
      Pages 201-220
    2. Protecting Obfuscation against Algebraic Attacks

      • Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
      Pages 221-238
    3. GGHLite: More Efficient Multilinear Maps from Ideal Lattices

      • Adeline Langlois, Damien Stehlé, Ron Steinfeld
      Pages 239-256
  7. Authenticated Encryption

    1. Reconsidering Generic Composition

      • Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
      Pages 257-274
  8. Symmetric Encryption

    1. Honey Encryption: Security Beyond the Brute-Force Bound

      • Ari Juels, Thomas Ristenpart
      Pages 293-310
    2. Sometimes-Recurse Shuffle

      • Ben Morris, Phillip Rogaway
      Pages 311-326
    3. Tight Security Bounds for Key-Alternating Ciphers

      • Shan Chen, John Steinberger
      Pages 327-350

Other Volumes

  1. Advances in Cryptology – EUROCRYPT 2014

About this book

This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

Editors and Affiliations

  • Départment d’informatique, Ecole normale supérieure, Paris Cedex 05, France

    Phong Q. Nguyen

  • Department of Computer Science, University of Bristol, Bristol, UK

    Elisabeth Oswald

Bibliographic Information

  • Book Title: Advances in Cryptology – EUROCRYPT 2014

  • Book Subtitle: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings

  • Editors: Phong Q. Nguyen, Elisabeth Oswald

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-55220-5

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: International Association for Cryptologic Research 2014

  • Softcover ISBN: 978-3-642-55219-9Published: 15 May 2014

  • eBook ISBN: 978-3-642-55220-5Published: 30 April 2014

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 714

  • Number of Illustrations: 77 b/w illustrations

  • Topics: Cryptology, Algorithm Analysis and Problem Complexity, Systems and Data Security

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access