Skip to main content
  • Conference proceedings
  • © 2016

Advances in Cryptology – CRYPTO 2016

36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9815)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

    Pages I-XIII
  2. Asymmetric Cryptography

    1. Front Matter

      Pages 1-1
    2. Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli

      • Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
      Pages 3-32
    3. Optimal Security Proofs for Signatures from Identification Schemes

      • Eike Kiltz, Daniel Masny, Jiaxin Pan
      Pages 33-61
    4. FHE Circuit Privacy Almost for Free

      • Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee
      Pages 62-89
  3. Symmetric Cryptography

    1. Front Matter

      Pages 91-91
    2. Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem

      • Léo Perrin, Aleksei Udovenko, Alex Biryukov
      Pages 93-122
    3. The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

      • Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin et al.
      Pages 123-153
  4. Cryptanalytic Tools

    1. Front Matter

      Pages 155-155
    2. Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks

      • Patrick Derbez, Pierre-Alain Fouque
      Pages 157-184
    3. Memory-Efficient Algorithms for Finding Needles in Haystacks

      • Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
      Pages 185-206
    4. Breaking Symmetric Cryptosystems Using Quantum Period Finding

      • Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María  Naya-Plasencia
      Pages 207-237
  5. Hardware-Oriented Cryptography

    1. Front Matter

      Pages 239-239
    2. Efficiently Computing Data-Independent Memory-Hard Functions

      • Joël Alwen, Jeremiah Blocki
      Pages 241-271
    3. Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems

      • Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, François-Xavier Standaert
      Pages 272-301
  6. Secure Computation and Protocols I

    1. Front Matter

      Pages 333-333
    2. Network-Hiding Communication and Applications to Multi-party Protocols

      • Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
      Pages 335-365
    3. Network Oblivious Transfer

      • Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
      Pages 366-396
    4. On the Power of Secure Two-Party Computation

      • Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
      Pages 397-429

About this book

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.

The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Editors and Affiliations

  • Impinj, Inc. , Seattle, USA

    Matthew Robshaw

  • University of Maryland , College Park, USA

    Jonathan Katz

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access