Advances in Cryptology – CRYPTO 2020 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part I

Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17–21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020. The 85 papers presented in the proceedings were carefully reviewed and selected from...

Full description

Bibliographic Details
Other Authors: Micciancio, Daniele (Editor), Ristenpart, Thomas (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2020, 2020
Edition:1st ed. 2020
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
  • Leakage-Resilient Key Exchange and Two-Seed Extractors
  • Outsourced encryption
  • Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
  • Fast and Secure Updatable Encryption
  • Incompressible Encodings
  • Constructions
  • New Constructions of Hinting PRGs, OWFs with Encryption, and more
  • Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
  • Collusion Resistant Watermarkable PRFs from Standard Assumptions
  • Verifiable Registration-Based Encryption
  • New Techniques for Traitor Tracing: Size N {1/3} and More from Pairings
  • Public Key Cryptography
  • Functional Encryption for Attribute-Weighted Sums from k-Lin
  • Amplifying the Security of Functional Encryption, Unconditionally
  • Dynamic Decentralized Functional Encryption
  • On Succinct Arguments and Witness Encryption from Groups
  • Fully Deniable Interactive Encryption
  • Chosen Ciphertext Security from Injective Trapdoor Functions
  • Security models
  • Handling Adaptive Compromise for Practical Encryption Schemes
  • Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees
  • Indifferentiability for Public Key Cryptosystems
  • Quantifying the Security Cost of Migrating Protocols to Practice
  • Symmetric and Real World Cryptography
  • The Memory-Tightness of Authenticated Encryption
  • Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions
  • The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
  • Security Analysis of NIST CTR-DRBG
  • Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
  • Universally Composable Relaxed Password Authenticated Key Exchange
  • Anonymous Tokens with Private Metadata Bit
  • Hardware Security and Leakage Resilience
  • Random Probing Security: Verification, Composition, Expansion and New Constructions