default search action
EUROCRYPT 2015: Sofia, Bulgaria
- Elisabeth Oswald, Marc Fischlin:
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9056, Springer 2015, ISBN 978-3-662-46799-2
Best Paper
- Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé:
Cryptanalysis of the Multilinear Map over the Integers. 3-12
Honorable Mentions
- Viet Tung Hoang, Ted Krovetz, Phillip Rogaway:
Robust Authenticated-Encryption AEZ and the Problem That It Solves. 15-44 - Anne Canteaut, Joëlle Roué:
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks. 45-74
Random Number Generators
- Thomas Shrimpton, R. Seth Terashima:
A Provable-Security Analysis of Intel's Secure Key RNG. 77-100 - Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. 101-126
Number Field Sieve
- Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain:
Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields. 129-155 - Cécile Pierrot:
The Multiple Number Field Sieve with Conjugation and Generalized Joux-Lercier Methods. 156-170
Algorithmic Cryptanalysis
- Alexandre Duc, Florian Tramèr, Serge Vaudenay:
Better Algorithms for LWE and LWR. 173-202 - Alexander May, Ilya Ozerov:
On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes. 203-228
Symmetric Cryptanalysis I
- Itai Dinur:
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE. 231-253 - Gregor Leander, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. 254-283
Symmetric Cryptanalysis II
- Yosuke Todo:
Structural Evaluation by Generalized Integral Property. 287-314 - Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban:
Cryptanalysis of SP Networks with Partial Non-Linear Layers. 315-342
Hash Functions
- Gaëtan Leurent, Lei Wang:
The Sum Can Be Weaker Than Each Part. 345-367 - Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O'Hearn:
SPHINCS: Practical Stateless Hash-Based Signatures. 368-397
Evaluating Implementations
- Alexandre Duc, Sebastian Faust, François-Xavier Standaert:
Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device. 401-429 - Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner:
Ciphers for MPC and FHE. 430-454
Masking
- Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub:
Verified Proofs of Higher-Order Masking. 457-485 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs:
Inner Product Masking Revisited. 486-510
Fully Homomorphic Encryption I
- Jung Hee Cheon, Damien Stehlé:
Fully Homomophic Encryption over the Integers Revisited. 513-536 - Koji Nuida, Kaoru Kurosawa:
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces. 537-555
Related-Key Attacks
- Xianhui Lu, Bao Li, Dingding Jia:
KDM-CCA Security from RKA Secure Authenticated Encryption. 559-583 - Benoit Cogliati, Yannick Seurin:
On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks. 584-613
Fully Homomorphic Encryption II
- Léo Ducas, Daniele Micciancio:
FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second. 617-640 - Shai Halevi, Victor Shoup:
Bootstrapping for HElib. 641-670
Efficient Two-Party Protocols
- Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries. 673-701 - Arash Afshar, Zhangxiang Hu, Payman Mohassel, Mike Rosulek:
How to Efficiently Evaluate RAM Programs with Malicious Security. 702-729
Symmetric Cryptanalysis III
- Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function. 733-761 - Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser:
Twisted Polynomials and Forgery Attacks on GCM. 762-786
Lattices
- Vadim Lyubashevsky, Thomas Prest:
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices. 789-815
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.