CRYPTO A*

44 papers

YearTitle / Authors
20111/
Amos Beimel, Yehuda Lindell, Eran Omri, Ilan Orlov
2011A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.
Carolyn Whitnall, Elisabeth Oswald
2011A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack.
Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda Alkhzaimi, Erik Zenner
2011A New Variant of PMAC: Beyond the Birthday Bound.
Kan Yasuda
2011Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings
Phillip Rogaway
2011Analyzing Blockwise Lattice Algorithms Using Dynamical Systems.
Guillaume Hanrot, Xavier Pujol, Damien Stehlé
2011Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.
Mihir Bellare, Sriram Keelveedhi
2011Automatic Search of Attacks on Round-Reduced AES and Applications.
Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque
2011Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
Zvika Brakerski, Gil Segev
2011Bi-Deniable Public-Key Encryption.
Adam O'Neill, Chris Peikert, Brent Waters
2011Classical Cryptographic Protocols in a Quantum World.
Sean Hallgren, Adam D. Smith, Fang Song
2011Computer-Aided Security Proofs for the Working Cryptographer.
Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella-Béguelin
2011Constant-Rate Oblivious Transfer from Noisy Channels.
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, Jürg Wullschleger
2011Cryptography with Tamperable and Leaky Memory.
Yael Tauman Kalai, Bhavana Kanukurthi, Amit Sahai
2011Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
Zvika Brakerski, Vinod Vaikuntanathan
2011Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi
2011Generic Side-Channel Distinguishers: Improvements and Limitations.
Nicolas Veyrat-Charvillon, François-Xavier Standaert
2011How to Improve Rebound Attacks.
María Naya-Plasencia
2011Inverting HFE Systems Is Quasi-Polynomial for All Fields.
Jintai Ding, Timothy J. Hodges
2011Key-Evolution Schemes Resilient to Space-Bounded Leakage.
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
2011Leakage-Resilient Zero Knowledge.
Sanjam Garg, Abhishek Jain, Amit Sahai
2011Leftover Hash Lemma, Revisited.
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu
2011McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.
Hang Dinh, Cristopher Moore, Alexander Russell
2011Memory Delegation.
Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz
2011Merkle Puzzles in a Quantum World.
Gilles Brassard, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante, Louis Salvail
2011Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Masayuki Abe, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo
2011Optimal Verification of Operations on Dynamic Sets.
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2011Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
Alexandra Boldyreva, Nathan Chenette, Adam O'Neill
2011Perfectly-Secure Multiplication for Any
Gilad Asharov, Yehuda Lindell, Tal Rabin
2011Physically Uncloneable Functions in the Universal Composition Framework.
Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
2011Position-Based Quantum Cryptography: Impossibility and Constructions.
Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner
2011Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.
Daniele Micciancio, Petros Mol
2011Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.
Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari
2011Random Oracle Reducibility.
Paul Baecher, Marc Fischlin
2011Round Optimal Blind Signatures.
Sanjam Garg, Vanishree Rao, Amit Sahai, Dominique Schröder, Dominique Unruh
2011Secure Computation on the Web: Computing without Simultaneous Interaction.
Shai Halevi, Yehuda Lindell, Benny Pinkas
2011Smaller Decoding Exponents: Ball-Collision Decoding.
Daniel J. Bernstein, Tanja Lange, Christiane Peters
2011The Collision Security of Tandem-DM in the Ideal Cipher Model.
Jooyoung Lee, Martijn Stam, John P. Steinberger
2011The IPS Compiler: Optimizations, Variants and Concrete Efficiency.
Yehuda Lindell, Eli Oxman, Benny Pinkas
2011The PHOTON Family of Lightweight Hash Functions.
Jian Guo, Thomas Peyrin, Axel Poschmann
2011The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.
Ignacio Cascudo Pueyo, Ronald Cramer, Chaoping Xing
2011Time-Lock Puzzles in the Random Oracle Model.
Mohammad Mahmoody, Tal Moran, Salil P. Vadhan
2011Tor and Circumvention: Lessons Learned - (Abstract to Go with Invited Talk).
Roger Dingledine
2011Verifiable Delegation of Computation over Large Datasets.
Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis