EUROCRYPT A*

39 papers

YearTitle / Authors
2014A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing.
Himanshu Tyagi, Shun Watanabe
2014A Full Characterization of Completeness for Two-Party Randomized Function Evaluation.
Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
2014A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé
2014Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings
Phong Q. Nguyen, Elisabeth Oswald
2014Distributed Point Functions and Their Applications.
Niv Gilboa, Yuval Ishai
2014Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More.
Nuttapong Attrapadung
2014Déjà Q: Using Dual Systems to Revisit q-Type Assumptions.
Melissa Chase, Sarah Meiklejohn
2014Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs
2014Efficient Round Optimal Blind Signatures.
Sanjam Garg, Divya Gupta
2014Faster Compact Diffie-Hellman: Endomorphisms on the x-line.
Craig Costello, Hüseyin Hisil, Benjamin Smith
2014Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
2014GGHLite: More Efficient Multilinear Maps from Ideal Lattices.
Adeline Langlois, Damien Stehlé, Ron Steinfeld
2014Garbled RAM Revisited.
Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs
2014Generic Universal Forgery Attack on Iterative Hash-Based MACs.
Thomas Peyrin, Lei Wang
2014Higher Order Masking of Look-Up Tables.
Jean-Sébastien Coron
2014Honey Encryption: Security Beyond the Brute-Force Bound.
Ari Juels, Thomas Ristenpart
2014How to Certify the Leakage of a Chip?
François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon
2014Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack.
Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
2014Key Derivation without Entropy Waste.
Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
2014Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig.
Mihir Bellare, Sarah Meiklejohn, Susan Thomson
2014Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities.
Céline Blondeau, Kaisa Nyberg
2014Multi-input Functional Encryption.
Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou
2014Non-Interactive Secure Computation Based on Cut-and-Choose.
Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva
2014Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
Benoît Libert, Thomas Peters, Marc Joye, Moti Yung
2014On the Complexity of UC Commitments.
Juan A. Garay, Yuval Ishai, Ranjit Kumaresan, Hoeteck Wee
2014Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions.
Kazuhiko Minematsu
2014Polynomial Time Attack on Wild McEliece over Quadratic Extensions.
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich
2014Protecting Obfuscation against Algebraic Attacks.
Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2014Reconsidering Generic Composition.
Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
2014Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation.
Susan Hohenberger, Amit Sahai, Brent Waters
2014Revocable Quantum Timed-Release Encryption.
Dominique Unruh
2014Salvaging Indifferentiability in a Multi-stage Setting.
Arno Mittelbach
2014Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time.
Ben Morris, Phillip Rogaway
2014Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus.
Jean-Charles Faugère, Louise Huot, Antoine Joux, Guénaël Renault, Vanessa Vitse
2014The Locality of Searchable Symmetric Encryption.
David Cash, Stefano Tessaro
2014Tight Security Bounds for Key-Alternating Ciphers.
Shan Chen, John P. Steinberger
2014Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
Alexandre Duc, Stefan Dziembowski, Sebastian Faust
2014Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption.
Morten Dahl, Ivan Damgård
2014Why Proving HIBE Systems Secure Is Difficult.
Allison B. Lewko, Brent Waters