Skip to main content
  • Conference proceedings
  • © 2020

Advances in Cryptology – CRYPTO 2020

40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12171)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2020.

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

    Pages i-xv
  2. Public Key Cryptanalysis

    1. Front Matter

      Pages 1-1
    2. A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem

      • Jean-Sébastien Coron, Agnese Gini
      Pages 3-31
    3. Asymptotic Complexities of Discrete Logarithm Algorithms in Pairing-Relevant Finite Fields

      • Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
      Pages 32-61
    4. Comparing the Difficulty of Factorization and Discrete Logarithm: A 240-Digit Experiment

      • Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, Paul Zimmermann
      Pages 62-91
    5. Breaking the Decisional Diffie-Hellman Problem for Class Group Actions Using Genus Theory

      • Wouter Castryck, Jana Sotáková, Frederik Vercauteren
      Pages 92-120
    6. A Classification of Computational Assumptions in the Algebraic Group Model

      • Balthazar Bauer, Georg Fuchsbauer, Julian Loss
      Pages 121-151
  3. Lattice Algorithms and Cryptanalysis

    1. Front Matter

      Pages 153-153
    2. Fast Reduction of Algebraic Lattices over Cyclotomic Fields

      • Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
      Pages 155-185
    3. Faster Enumeration-Based Lattice Reduction: Root Hermite Factor \(k^{1/(2k)}\) Time \(k^{k/8+o(k)}\)

      • Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen
      Pages 186-212
    4. Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP

      • Tamalika Mukherjee, Noah Stephens-Davidowitz
      Pages 213-242
    5. Random Self-reducibility of Ideal-SVP via Arakelov Random Walks

      • Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski
      Pages 243-273
    6. Slide Reduction, Revisited—Filling the Gaps in SVP Approximation

      • Divesh Aggarwal, Jianwei Li, Phong Q. Nguyen, Noah Stephens-Davidowitz
      Pages 274-295
    7. Rounding in the Rings

      • Feng-Hao Liu, Zhedong Wang
      Pages 296-326
  4. Lattice-Based and Post-quantum Cryptography

    1. Front Matter

      Pages 327-327
    2. LWE with Side Information: Attacks and Concrete Security Estimation

      • Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
      Pages 329-358
    3. Efficient Pseudorandom Correlation Generators from Ring-LPN

      • Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
      Pages 387-416
    4. Scalable Pseudorandom Quantum States

      • Zvika Brakerski, Omri Shmueli
      Pages 417-440
    5. A Non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge

      • Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
      Pages 441-469

About this book

Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17–21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020.

The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows:

Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions.

Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation.

Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge. 



Editors and Affiliations

  • UC San Diego, La Jolla, USA

    Daniele Micciancio

  • Cornell Tech, New York, USA

    Thomas Ristenpart

Bibliographic Information

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access