


default search action
ASIACRYPT 2014: Kaoshiung, Taiwan, R.O.C.
- Palash Sarkar, Tetsu Iwata:
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II. Lecture Notes in Computer Science 8874, Springer 2014, ISBN 978-3-662-45607-1
Encryption Schemes
- Benoît Libert, Marc Joye, Moti Yung, Thomas Peters:
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security. 1-21 - Léo Ducas, Vadim Lyubashevsky, Thomas Prest
:
Efficient Identity-Based Encryption over NTRU Lattices. 22-41 - Isamu Teranishi, Moti Yung, Tal Malkin:
Order-Preserving Encryption Secure Beyond One-Wayness. 42-61
Outsourcing and Delegation
- Kai-Min Chung, Zhenming Liu, Rafael Pass
:
Statistically-secure ORAM with Õ(log2 n) Overhead. 62-81 - Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao:
Adaptive Security of Constrained PRFs. 82-101
Obfuscation
- Mihir Bellare, Igors Stepanovs, Stefano Tessaro:
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation. 102-121 - Christina Brzuska, Arno Mittelbach:
Using Indistinguishability Obfuscation via UCEs. 122-141 - Christina Brzuska, Arno Mittelbach:
Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input. 142-161 - Benny Applebaum:
Bootstrapping Obfuscators via Fast Pseudorandom Functions. 162-172
Homomorphic Cryptography
- Chihong Joo, Aaram Yun:
Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack. 173-192 - Dario Catalano, Antonio Marcedone, Orazio Puglisi:
Authenticating Computation on Groups: New Homomorphic Primitives and Applications. 193-212 - Ivan Damgård, Bernardo Machado David, Irene Giacomelli, Jesper Buus Nielsen
:
Compact VSS and Efficient Homomorphic UC Commitments. 213-232
Secret Sharing
- Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. 233-253 - Ilan Komargodski, Moni Naor, Eylon Yogev:
Secret-Sharing for NP. 254-273
Block Ciphers and Passwords
- Jérémy Jean, Ivica Nikolic, Thomas Peyrin:
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework. 274-288 - Christian Forler, Stefan Lucks, Jakob Wenzel:
Memory-Demanding Password Scrambling. 289-305
Side Channel Analysis II
- Sonia Belaïd, Pierre-Alain Fouque
, Benoît Gérard:
Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM. 306-325 - Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Higher-Order Threshold Implementations. 326-343 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Masks Will Fall Off - Higher-Order Optimal Distinguishers. 344-365
Black-Box Separation
- Jiang Zhang
, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang:
Black-Box Separations for One-More (Static) CDH and Its Generalization. 366-385 - Dakshita Khurana, Hemanta K. Maji, Amit Sahai:
Black-Box Separations for Differentially Private Protocols. 386-405
Composability
- Vedran Dunjko
, Joseph F. Fitzsimons, Christopher Portmann, Renato Renner:
Composable Security of Delegated Quantum Computation. 406-425 - Eiichiro Fujisaki:
All-But-Many Encryption - A New Framework for Fully-Equipped UC Commitments. 426-447
Multi-Party Computation
- Martin Hirt, Pavel Raykov:
Multi-valued Byzantine Broadcast: The t < n Case. 448-465 - Ran Cohen
, Yehuda Lindell:
Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation. 466-485 - Payman Mohassel, Seyed Saeed Sadeghian, Nigel P. Smart:
Actively Secure Private Function Evaluation. 486-505 - Marcel Keller
, Peter Scholl:
Efficient, Oblivious Data Structures for MPC. 506-525

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
