Skip to main content
  • Conference proceedings
  • © 2008

Advances in Cryptology - CRYPTO 2008

28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5157)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2008.

Buy it now

Buying options

eBook USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. Random Oracles

    1. The Random Oracle Model and the Ideal Cipher Model Are Equivalent

      • Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin
      Pages 1-20
    2. Programmable Hash Functions and Their Applications

      • Dennis Hofheinz, Eike Kiltz
      Pages 21-38
  3. Applications

    1. One-Time Programs

      • Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum
      Pages 39-56
    2. Adaptive One-Way Functions and Applications

      • Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan
      Pages 57-74
  4. Public-Key Crypto I

    1. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys

      • Dimitar Jetchev, Ramarathnam Venkatesan
      Pages 75-92
    2. Improved Bounds on Security Reductions for Discrete Log Based Signatures

      • Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam
      Pages 93-107
    3. Circular-Secure Encryption from Decision Diffie-Hellman

      • Dan Boneh, Shai Halevi, Mike Hamburg, Rafail Ostrovsky
      Pages 108-125
    4. Public-Key Locally-Decodable Codes

      • Brett Hemenway, Rafail Ostrovsky
      Pages 126-143
  5. Hash Functions I

    1. Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms

      • Helena Handschuh, Bart Preneel
      Pages 144-161
    2. Cryptanalysis of the GOST Hash Function

      • Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt
      Pages 162-178
    3. Preimages for Reduced SHA-0 and SHA-1

      • Christophe De Cannière, Christian Rechberger
      Pages 179-202
  6. Cryptanalysis I

    1. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme

      • Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
      Pages 203-220
    2. Bug Attacks

      • Eli Biham, Yaniv Carmeli, Adi Shamir
      Pages 221-240
  7. Multiparty Computation I

    1. Scalable Multiparty Computation with Nearly Optimal Work and Resilience

      • Ivan DamgÃ¥rd, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam Smith
      Pages 241-261
  8. Cryptanalysis II

    1. Cryptanalysis of MinRank

      • Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret
      Pages 280-296
    2. New State Recovery Attack on RC4

      • Alexander Maximov, Dmitry Khovratovich
      Pages 297-316
  9. Public-Key Crypto II

    1. Dynamic Threshold Public-Key Encryption

      • Cécile Delerablée, David Pointcheval
      Pages 317-334
    2. On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles

      • Alexandra Boldyreva, Serge Fehr, Adam O’Neill
      Pages 335-359

Other Volumes

  1. Advances in Cryptology – CRYPTO 2008

About this book

This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008. The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on random oracles, applications, public-key crypto, hash functions, cryptanalysis, multiparty computation, privacy, zero knowledge, and oblivious transfer.

Bibliographic Information

Buy it now

Buying options

eBook USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access