Overview
- Editors:
- Daniele Micciancio
UC San Diego, La Jolla, USA
Search author on:PubMed Google Scholar
- Thomas Ristenpart
Cornell Tech, New York, USA
Search author on:PubMed Google Scholar
Part of the book series:Lecture Notes in Computer Science (LNCS, volume 12172)
Part of the book sub series:Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: CRYPTO 2020.
101kAccesses
4Citations
This is a preview of subscription content,log in via an institution to check access.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17–21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020.
The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows:
Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions.
Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation.
Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge.
Similar content being viewed by others
Keywords
- artificial intelligence
- authentication
- ciphertexts
- communication
- computer networks
- computer systems
- cryptography
- data mining
- data privacy
- data security
- electronic document identification systems
- encryption
- engineering
- mathematics
- network protocols
- network security
- public key cryptography
- signal processing
- software engineering
Table of contents (28 papers)
Front Matter
Pages i-xvMulti-party Computation
Front Matter
Pages 1-1Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
- Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung
Pages 3-33Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF
- Melissa Chase, Peihan Miao
Pages 34-63Multiparty Generation of an RSA Modulus
- Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield et al.
Pages 64-93
Secret Sharing
Front Matter
Pages 95-95Non-malleability Against Polynomial Tampering
- Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan
Pages 97-126Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model
- Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi
Pages 127-155Nearly Optimal Robust Secret Sharing Against Rushing Adversaries
- Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan
Pages 156-185
Cryptanalysis
Front Matter
Pages 187-187Cryptanalytic Extraction of Neural Network Models
- Nicholas Carlini, Matthew Jagielski, Ilya Mironov
Pages 189-218Automatic Verification of Differential Characteristics: Application to Reduced Gimli
- Fukang Liu, Takanori Isobe, Willi Meier
Pages 219-248The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
- Thomas Peyrin, Haoyang Wang
Pages 249-278Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme
- Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
Pages 279-298Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems
- Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent et al.
Pages 299-328Improved Differential-Linear Attacks with Applications to ARX Ciphers
- Christof Beierle, Gregor Leander, Yosuke Todo
Pages 329-358Cryptanalysis Results on Spook
- Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher
Pages 359-388Alzette: A 64-Bit ARX-box
- Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko et al.
Pages 419-448
Delay Functions
Front Matter
Pages 449-449
Other volumes
Advances in Cryptology – CRYPTO 2020
Advances in Cryptology – CRYPTO 2020
Advances in Cryptology – CRYPTO 2020
Editors and Affiliations
UC San Diego, La Jolla, USA
Daniele Micciancio
Cornell Tech, New York, USA
Thomas Ristenpart
Accessibility Information
Bibliographic Information
Book Title:Advances in Cryptology – CRYPTO 2020
Book Subtitle:40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III
Editors:Daniele Micciancio, Thomas Ristenpart
Series Title:Lecture Notes in Computer Science
DOI:https://doi.org/10.1007/978-3-030-56877-1
Publisher:Springer Cham
eBook Packages:Computer Science,Computer Science (R0)
Copyright Information:International Association for Cryptologic Research 2020
Softcover ISBN:978-3-030-56876-4Published: 12 August 2020
eBook ISBN:978-3-030-56877-1Published: 11 August 2020
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number:1
Number of Pages:XV, 832
Number of Illustrations:417 b/w illustrations, 31 illustrations in colour
Topics:Cryptology,Data Structures and Information Theory,Computer Communication Networks,Systems and Data Security,Information Systems Applications (incl. Internet),Software Engineering/Programming and Operating Systems