default search action
38th CRYPTO 2018: Santa Barbara, CA, USA - Part I
- Hovav Shacham, Alexandra Boldyreva:
Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I. Lecture Notes in Computer Science 10991, Springer 2018, ISBN 978-3-319-96883-4
Secure Messaging
- Bertram Poettering, Paul Rösler:
Towards Bidirectional Ratcheted Key Exchange. 3-32 - Joseph Jaeger, Igors Stepanovs:
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging. 33-62 - Lior Rotem, Gil Segev:
Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal. 63-89
Implementations and Physical Attacks Prevention
- Shai Halevi, Victor Shoup:
Faster Homomorphic Linear Transformations in HElib. 93-120 - Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel P. Smart:
CAPA: The Spirit of Beaver Against Physical Attacks. 121-151
Authenticated and Format-Preserving Encryption
- Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. 155-186 - Manuel Barbosa, Pooya Farshim:
Indifferentiable Authenticated Encryption. 187-220 - Viet Tung Hoang, Stefano Tessaro, Ni Trieu:
The Curse of Small Domains: New Attacks on Format-Preserving Encryption. 221-251
Cryptoanalysis
- Adi Ben-Zvi, Arkadius G. Kalka, Boaz Tsaban:
Cryptanalysis via Algebraic Spans. 255-274 - Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. 275-305 - Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras:
Generic Attacks Against Beyond-Birthday-Bound MACs. 306-336
Searchable Encryption and Differential Privacy
- Seny Kamara, Tarik Moataz, Olga Ohrimenko:
Structured Encryption and Leakage Suppression. 339-370 - Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou:
Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency. 371-406 - Gilad Asharov, Gil Segev, Ido Shahaf:
Tight Tradeoffs in Searchable Symmetric Encryption. 407-436 - Lucas Kowalczyk, Tal Malkin, Jonathan R. Ullman, Daniel Wichs:
Hardness of Non-interactive Differential Privacy from One-Way Functions. 437-466 - Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters:
Risky Traitor Tracing and New Differential Privacy Negative Results. 467-497
Secret Sharing
- Vipul Goyal, Ashutosh Kumar:
Non-malleable Secret Sharing for General Access Structures. 501-530 - Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:
On the Local Leakage Resilience of Linear Secret Sharing Schemes. 531-561
Encryption
- Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. 565-596 - Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu:
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings. 597-627
Symmetric Cryptography
- Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda:
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. 631-661 - Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. 662-692 - Sandro Coretti, Yevgeniy Dodis, Siyao Guo:
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models. 693-721 - Benoît Cogliati, Yevgeniy Dodis, Jonathan Katz, Jooyoung Lee, John P. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang:
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks. 722-753
Proofs of Work and Proofs of Stake
- Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. 757-788 - Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan:
Proofs of Work From Worst-Case Assumptions. 789-819
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.