Advances in Cryptology – CRYPTO 2020 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part I
Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17–21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020. The 85 papers presented in the proceedings were carefully reviewed and selected from...
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham
Springer International Publishing
2020, 2020
|
Edition: | 1st ed. 2020 |
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
- Leakage-Resilient Key Exchange and Two-Seed Extractors
- Outsourced encryption
- Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
- Fast and Secure Updatable Encryption
- Incompressible Encodings
- Constructions
- New Constructions of Hinting PRGs, OWFs with Encryption, and more
- Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
- Collusion Resistant Watermarkable PRFs from Standard Assumptions
- Verifiable Registration-Based Encryption
- New Techniques for Traitor Tracing: Size N {1/3} and More from Pairings
- Public Key Cryptography
- Functional Encryption for Attribute-Weighted Sums from k-Lin
- Amplifying the Security of Functional Encryption, Unconditionally
- Dynamic Decentralized Functional Encryption
- On Succinct Arguments and Witness Encryption from Groups
- Fully Deniable Interactive Encryption
- Chosen Ciphertext Security from Injective Trapdoor Functions
- Security models
- Handling Adaptive Compromise for Practical Encryption Schemes
- Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees
- Indifferentiability for Public Key Cryptosystems
- Quantifying the Security Cost of Migrating Protocols to Practice
- Symmetric and Real World Cryptography
- The Memory-Tightness of Authenticated Encryption
- Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions
- The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
- Security Analysis of NIST CTR-DRBG
- Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
- Universally Composable Relaxed Password Authenticated Key Exchange
- Anonymous Tokens with Private Metadata Bit
- Hardware Security and Leakage Resilience
- Random Probing Security: Verification, Composition, Expansion and New Constructions