CRYPTO A*

51 papers

YearTitle / Authors
2012A New Approach to Practical Active-Secure Two-Party Computation.
Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra
2012Actively Secure Two-Party Evaluation of Any Quantum Operation.
Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail
2012Adaptively Secure Multi-Party Computation with Dishonest Majority.
Sanjam Garg, Amit Sahai
2012Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
Reihaneh Safavi-Naini, Ran Canetti
2012An Enciphering Scheme Based on a Card Shuffle.
Viet Tung Hoang, Ben Morris, Phillip Rogaway
2012Black-Box Constructions of Composable Protocols without Set-Up.
Huijia Lin, Rafael Pass
2012Breaking and Repairing GCM Security Proofs.
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
2012Collusion-Preserving Computation.
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas
2012Crowd-Blending Privacy.
Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass
2012Differential Privacy with Imperfect Randomness.
Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil P. Vadhan
2012Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption.
Amit Sahai, Hakan Seyalioglu, Brent Waters
2012Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2012Efficient Padding Oracle Attacks on Cryptographic Hardware.
Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay
2012Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
Zvika Brakerski
2012Functional Encryption for Regular Languages.
Brent Waters
2012Functional Encryption with Bounded Collusions via Multi-party Computation.
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2012Group Signatures with Almost-for-Free Revocation.
Benoît Libert, Thomas Peters, Moti Yung
2012Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves.
Alexandre Duc, Dimitar Jetchev
2012Hash Functions Based on Three Permutations: A Generic Security Analysis.
Bart Mennink, Bart Preneel
2012Homomorphic Evaluation of the AES Circuit.
Craig Gentry, Shai Halevi, Nigel P. Smart
2012How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware.
Guy N. Rothblum
2012Impossibility Results for Static Input Secure Computation.
Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti
2012Multi-instance Security and Its Application to Password-Based Cryptography.
Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
2012Multiparty Computation from Somewhat Homomorphic Encryption.
Ivan Damgård, Valerio Pastro, Nigel P. Smart, Sarah Zakarias
2012Must You Know the Code of f to Securely Compute f?
Mike Rosulek
2012Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority.
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky
2012New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.
Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai
2012New Preimage Attacks against Reduced SHA-1.
Simon Knellwolf, Dmitry Khovratovich
2012New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
Allison B. Lewko, Brent Waters
2012On the Distribution of Linear Biases: Three Instructive Examples.
Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander
2012On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.
Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
2012On the Security of TLS-DHE in the Standard Model.
Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
2012Public Keys.
Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter
2012Quantum to Classical Randomness Extractors.
Mario Berta, Omar Fawzi, Stephanie Wehner
2012Recent Advances and Existing Research Questions in Platform Security.
Ernie Brickell
2012Resistance against Iterated Attacks by Decorrelation Revisited, .
Aslí Bay, Atefeh Mashatan, Serge Vaudenay
2012Secret Sharing Schemes for Very Dense Graphs.
Amos Beimel, Oriol Farràs, Yuval Mintz
2012Secure Database Commitments and Universal Arguments of Quasi Knowledge.
Melissa Chase, Ivan Visconti
2012Secure Identity-Based Encryption in the Quantum Random Oracle Model.
Mark Zhandry
2012Securing Circuits against Constant-Rate Tampering.
Dana Dachman-Soled, Yael Tauman Kalai
2012Semantic Security for the Wiretap Channel.
Mihir Bellare, Stefano Tessaro, Alexander Vardy
2012Stam's Conjecture and Threshold Phenomena in Collision Resistance.
John P. Steinberger, Xiaoming Sun, Zhe Yang
2012Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs.
Eric Miles, Emanuele Viola
2012Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits.
Nir Bitansky, Alessandro Chiesa
2012Tamper and Leakage Resilience in the Split-State Model.
Feng-Hao Liu, Anna Lysyanskaya
2012The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives.
Mohammad Mahmoody, Rafael Pass
2012The End of Crypto.
Jonathan Zittrain
2012Tightly Secure Signatures and Public-Key Encryption.
Dennis Hofheinz, Tibor Jager
2012To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC.
Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro
2012Tweakable Blockciphers with Beyond Birthday-Bound Security.
Will Landecker, Thomas Shrimpton, R. Seth Terashima
2012Universal Composability from Essentially Any Trusted Setup.
Mike Rosulek