EUROCRYPT A*

43 papers

YearTitle / Authors
2013A Toolkit for Ring-LWE Cryptography.
Vadim Lyubashevsky, Chris Peikert, Oded Regev
2013Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings
Thomas Johansson, Phong Q. Nguyen
2013Amplification of Chosen-Ciphertext Security.
Huijia Lin, Stefano Tessaro
2013Batch Fully Homomorphic Encryption over the Integers.
Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun
2013Candidate Multilinear Maps from Ideal Lattices.
Sanjam Garg, Craig Gentry, Shai Halevi
2013Circular Chosen-Ciphertext Security with Compact Ciphertexts.
Dennis Hofheinz
2013Cryptanalysis of Full RIPEMD-128.
Franck Landelle, Thomas Peyrin
2013Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions.
Ananth Raghunathan, Gil Segev, Salil P. Vadhan
2013Dynamic Proofs of Retrievability via Oblivious RAM.
David Cash, Alptekin Küpçü, Daniel Wichs
2013Efficient Cryptosystems from 2
Marc Joye, Benoît Libert
2013Fast Cryptography in Genus 2.
Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter
2013Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields.
Antoine Joux
2013Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem.
Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber
2013How to Garble RAM Programs
Steve Lu, Rafail Ostrovsky
2013How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation.
Payman Mohassel, Seyed Saeed Sadeghian
2013How to Watermark Cryptographic Functions.
Ryo Nishimaki
2013Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
2013Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean
2013Improving Local Collisions: New Attacks on Reduced SHA-256.
Florian Mendel, Tomislav Nad, Martin Schläffer
2013Keccak.
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2013Leakage-Resilient Cryptography from Minimal Assumptions.
Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs
2013Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
Marc Fischlin, Nils Fleischhacker
2013Locally Computable UOWHF with Linear Shrinkage.
Benny Applebaum, Yoni Moses
2013Lossy Codes and a New Variant of the Learning-With-Errors Problem.
Nico Döttling, Jörn Müller-Quade
2013Masking against Side-Channel Attacks: A Formal Security Proof.
Emmanuel Prouff, Matthieu Rivain
2013Message-Locked Encryption and Secure Deduplication.
Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
2013MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions.
Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
2013Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction.
S. Dov Gordon, Tal Malkin, Mike Rosulek, Hoeteck Wee
2013New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis.
Marc Stevens
2013New Links between Differential and Linear Cryptanalysis.
Céline Blondeau, Kaisa Nyberg
2013On Concurrently Secure Computation in the Multiple Ideal Query Model.
Vipul Goyal, Abhishek Jain
2013One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games.
Marco Tomamichel, Serge Fehr, Jedrzej Kaniewski, Stephanie Wehner
2013Practical Homomorphic MACs for Arithmetic Circuits.
Dario Catalano, Dario Fiore
2013Practical Signatures from Standard Assumptions.
Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, Christoph Striecks
2013Quadratic Span Programs and Succinct NIZKs without PCPs.
Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova
2013Quantum-Secure Message Authentication Codes.
Dan Boneh, Mark Zhandry
2013Regularity of Lossy RSA on Subdomains and Its Applications.
Mark Lewko, Adam O'Neill, Adam D. Smith
2013Resource-Restricted Indifferentiability.
Grégory Demay, Peter Gazi, Martin Hirt, Ueli Maurer
2013Security Evaluations beyond Computing Power.
Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
2013Streaming Authenticated Data Structures.
Charalampos Papamanthou, Elaine Shi, Roberto Tamassia, Ke Yi
2013Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption.
Jooyoung Lee
2013Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions.
Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
2013Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists.
Stephanie Bayer, Jens Groth