default search action
37th CRYPTO 2017: Santa Barbara, CA, USA - Part II
- Jonathan Katz, Hovav Shacham:
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10402, Springer 2017, ISBN 978-3-319-63714-3
OT and ORAM
- Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen:
Secure Computation Based on Leaky Correlations: High Resilience Setting. 3-32 - Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou:
Laconic Oblivious Transfer and Its Applications. 33-65 - Steve Lu, Rafail Ostrovsky:
Black-Box Parallel Garbled RAM. 66-92
Foundations II
- Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi:
Non-Malleable Codes for Space-Bounded Tampering. 95-126 - Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti:
Four-Round Concurrent Non-Malleable Commitments from One-Way Functions. 127-157 - Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum:
Distinguisher-Dependent Simulation in Two Rounds and its Applications. 158-189
Obfuscation II
- Sanjam Garg, Omkant Pandey:
Incremental Program Obfuscation. 193-223 - Yael Tauman Kalai, Guy N. Rothblum, Ron D. Rothblum:
From Obfuscation to the Security of Fiat-Shamir for Proofs. 224-251 - Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization. 252-279
Quantum
- Fang Song, Aaram Yun:
Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks. 283-309 - Gorjan Alagic, Christian Majenz:
Quantum Non-malleability and Authentication. 310-341 - Sumegha Garg, Henry Yuen, Mark Zhandry:
New Security Notions and Feasibility Results for Authentication of Quantum Data. 342-371
Hash Functions
- Itai Dinur, Niv Nadler:
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme. 375-403 - Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. 404-427 - Ling Song, Guohong Liao, Jian Guo:
Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak. 428-451
Lattices
- Daniele Micciancio, Michael Walter:
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time. 455-485 - Andre Esser, Robert Kübler, Alexander May:
LPN Decoded. 486-514
Signatures
- Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. 517-547 - Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan:
Compact Structure-Preserving Signatures with Almost Tight Security. 548-580 - Jens Groth, Mary Maller:
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. 581-612 - Yehuda Lindell:
Fast Secure Two-Party ECDSA Signing. 613-644
Block Ciphers
- Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants. 647-678 - F. Betül Durak, Serge Vaudenay:
Breaking the FF3 Format-Preserving Encryption Standard over Small Domains. 679-707 - Bart Mennink:
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. 708-732
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.