Skip to main content
  • Conference proceedings
  • © 2020

Advances in Cryptology – CRYPTO 2020

40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12172)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2020.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

    Pages i-xv
  2. Multi-party Computation

    1. Front Matter

      Pages 1-1
    2. Two-Sided Malicious Security for Private Intersection-Sum with Cardinality

      • Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung
      Pages 3-33
    3. Multiparty Generation of an RSA Modulus

      • Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield et al.
      Pages 64-93
  3. Secret Sharing

    1. Front Matter

      Pages 95-95
    2. Non-malleability Against Polynomial Tampering

      • Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan
      Pages 97-126
    3. Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model

      • Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi
      Pages 127-155
    4. Nearly Optimal Robust Secret Sharing Against Rushing Adversaries

      • Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan
      Pages 156-185
  4. Cryptanalysis

    1. Front Matter

      Pages 187-187
    2. Cryptanalytic Extraction of Neural Network Models

      • Nicholas Carlini, Matthew Jagielski, Ilya Mironov
      Pages 189-218
    3. Automatic Verification of Differential Characteristics: Application to Reduced Gimli

      • Fukang Liu, Takanori Isobe, Willi Meier
      Pages 219-248
    4. Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme

      • Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
      Pages 279-298
    5. Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems

      • Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent et al.
      Pages 299-328
    6. Improved Differential-Linear Attacks with Applications to ARX Ciphers

      • Christof Beierle, Gregor Leander, Yosuke Todo
      Pages 329-358
    7. Cryptanalysis Results on Spook

      • Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher
      Pages 359-388
    8. Cryptanalysis of LEDAcrypt

      • Daniel Apon, Ray Perlner, Angela Robinson, Paolo Santini
      Pages 389-418
    9. Alzette: A 64-Bit ARX-box

      • Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko et al.
      Pages 419-448
  5. Delay Functions

    1. Front Matter

      Pages 449-449

About this book

Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17–21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020.

The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows:

Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions.

Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation.

Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge. 



Editors and Affiliations

  • UC San Diego, La Jolla, USA

    Daniele Micciancio

  • Cornell Tech, New York, USA

    Thomas Ristenpart

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access