EUROCRYPT A*

44 papers

YearTitle / Authors
2012A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract).
Antoine Joux
2012Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.
Tatsuaki Okamoto, Katsuyuki Takashima
2012Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings
David Pointcheval, Thomas Johansson
2012All-But-Many Lossy Trapdoor Functions.
Dennis Hofheinz
2012Another Look at Provable Security.
Alfred Menezes
2012Concurrently Secure Computation in Constant Rounds.
Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai
2012Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over $\mathbb{F}_{p^6}$.
Antoine Joux, Vanessa Vitse
2012Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks.
Yu Sasaki
2012Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding.
Anja Becker, Antoine Joux, Alexander May, Alexander Meurer
2012Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security.
Susan Hohenberger, Allison B. Lewko, Brent Waters
2012Dual Projective Hashing and Its Applications - Lossy Trapdoor Functions and More.
Hoeteck Wee
2012Efficient Zero-Knowledge Argument for Correctness of a Shuffle.
Stephanie Bayer, Jens Groth
2012Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading.
Peter Gazi, Stefano Tessaro
2012Fair Computation with Rational Players.
Adam Groce, Jonathan Katz
2012Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers.
Yuanmi Chen, Phong Q. Nguyen
2012Fully Homomorphic Encryption with Polylog Overhead.
Craig Gentry, Shai Halevi, Nigel P. Smart
2012Group to Group Commitments Do Not Shrink.
Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo
2012Identity-Based (Lossy) Trapdoor Functions and Applications.
Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters
2012Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu
2012Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields.
Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault
2012Incremental Deterministic Public-Key Encryption.
Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev
2012Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser
2012Lattice Signatures without Trapdoors.
Vadim Lyubashevsky
2012Malleable Proof Systems and Applications.
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012Message Authentication, Revisited.
Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs
2012Minimalism in Cryptography: The Even-Mansour Scheme Revisited.
Orr Dunkelman, Nathan Keller, Adi Shamir
2012Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.
Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs
2012Narrow-Bicliques: Cryptanalysis of Full IDEA.
Dmitry Khovratovich, Gaëtan Leurent, Christian Rechberger
2012On Round-Optimal Zero Knowledge in the Bare Public-Key Model.
Alessandra Scafuro, Ivan Visconti
2012On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model.
Yannick Seurin
2012Optimal Security Proofs for Full Domain Hash, Revisited.
Saqib A. Kakvi, Eike Kiltz
2012Property Preserving Symmetric Encryption.
Omkant Pandey, Yannis Rouselakis
2012Pseudorandom Functions and Lattices.
Abhishek Banerjee, Chris Peikert, Alon Rosen
2012Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
2012Quantum Proofs of Knowledge.
Dominique Unruh
2012Robust Coin Flipping.
Gene S. Kopp, John D. Wiltshire-Gordon
2012Scalable Group Signatures with Revocation.
Benoît Libert, Thomas Peters, Moti Yung
2012Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
2012Standard Security Does Not Imply Security against Selective-Opening.
Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek
2012Statistical Tools Flavor Side-Channel Collision Attacks.
Amir Moradi
2012Tightly-Secure Signatures from Lossy Identification Schemes.
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi
2012Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting.
Allison B. Lewko
2012Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
Daniele Micciancio, Chris Peikert
2012Unconditionally-Secure Robust Secret Sharing with Compact Shares.
Alfonso Cevallos, Serge Fehr, Rafail Ostrovsky, Yuval Rabani