year |
venue |
title |
pages |
2016 | asiacrypt | Size-Hiding Computation for Multiple Parties | online |
2016 | asiacrypt | A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile - and Why It Is Not | online |
2016 | asiacrypt | Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions | online |
2016 | asiacrypt | Multi-key Homomorphic Authenticators | online |
2016 | asiacrypt | How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes | online |
2016 | asiacrypt | Zero-Knowledge Accumulators and Set Algebra | online |
2016 | asiacrypt | A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm | online |
2016 | asiacrypt | Universal Composition with Responsive Environments | online |
2016 | asiacrypt | Authenticated Encryption with Variable Stretch | online |
2016 | asiacrypt | Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes | online |
2016 | asiacrypt | Digital Signatures Based on the Hardness of Ideal Lattice Problems in All Rings | online |
2016 | asiacrypt | Design Strategies for ARX with Provable Bounds: Sparx and LAX | online |
2016 | asiacrypt | Efficient Public-Key Distance Bounding Protocol | online |
2016 | asiacrypt | Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting | online |
2016 | asiacrypt | Reactive Garbling: Foundation, Instantiation, Application | online |
2016 | asiacrypt | Reverse Cycle Walking and Its Applications | online |
2016 | asiacrypt | Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks | online |
2016 | asiacrypt | Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I | |
2016 | asiacrypt | Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations | online |
2016 | asiacrypt | Trick or Tweak: On the (In)security of OTR's Tweaks | online |
2016 | asiacrypt | When Are Fuzzy Extractors Possible? | online |
2016 | asiacrypt | Structure-Preserving Smooth Projective Hashing | online |
2016 | asiacrypt | Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds | online |
2016 | asiacrypt | Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions | online |
2016 | asiacrypt | Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings | online |
2016 | asiacrypt | Verifiable Functional Encryption | online |
2016 | asiacrypt | Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64 | online |
2016 | asiacrypt | Cliptography: Clipping the Power of Kleptographic Attacks | 34-64 |
2016 | asiacrypt | How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones | online |
2016 | asiacrypt | More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22 | online |
2016 | asiacrypt | Towards Tightly Secure Lattice Short Signature and Id-Based Encryption | online |
2016 | asiacrypt | Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions | online |
2016 | asiacrypt | From Identification to Signatures, Tightly: A Framework and Generic Transforms | online |
2016 | asiacrypt | Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations | online |
2016 | asiacrypt | Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials | online |
2016 | asiacrypt | Optimization of \mathsf LPN Solving Algorithms | online |
2016 | asiacrypt | Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions | online |
2016 | asiacrypt | Efficient and Provable White-Box Primitives | online |
2016 | asiacrypt | Side-Channel Analysis Protection and Low-Latency in Action - - Case Study of PRINCE and Midori - | online |
2016 | asiacrypt | MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity | online |
2016 | asiacrypt | Multi-input Functional Encryption with Unbounded-Message Security | online |
2016 | asiacrypt | A Shuffle Argument Secure in the Generic Model | online |
2016 | asiacrypt | Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption | online |
2016 | asiacrypt | Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II | |
2016 | asiacrypt | A New Algorithm for the Unbalanced Meet-in-the-Middle Problem | online |
2016 | asiacrypt | Selective Opening Security from Simulatable Data Encapsulation | online |
2016 | asiacrypt | Indistinguishable Proofs of Work or Knowledge | online |
2016 | asiacrypt | Adaptive Oblivious Transfer and Generalization | online |
2016 | asiacrypt | Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm | online |
2016 | asiacrypt | How to Generate and Use Universal Samplers | online |
2016 | asiacrypt | How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers | online |
2016 | asiacrypt | On the Security of Supersingular Isogeny Cryptosystems | online |
2016 | asiacrypt | Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps | online |
2016 | asiacrypt | Simpira v2: A Family of Efficient Permutations Using the AES Round Function | online |
2016 | asiacrypt | Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience | online |
2016 | asiacrypt | The Kernel Matrix Diffie-Hellman Assumption | online |
2016 | asiacrypt | A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors | online |
2016 | asiacrypt | From 5-Pass MQ -Based Identification to MQ -Based Signatures | online |
2016 | asiacrypt | Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness | online |
2016 | asiacrypt | Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction | online |
2016 | asiacrypt | Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF | online |
2016 | asiacrypt | Salvaging Weak Security Bounds for Blockcipher-Based Constructions | online |
2016 | asiacrypt | Selective-Opening Security in the Presence of Randomness Failures | online |
2016 | asiacrypt | Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions | online |
2016 | asiacrypt | The Reality of Cryptographic Deployments on the Internet | |
2016 | asiacrypt | NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion | online |
2016 | asiacrypt | Advances in Functional Encryption | |
2016 | asiacrypt | Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak | online |
2016 | asiacrypt | Cryptography in Vietnam in the French and American Wars | |
2016 | asiacrypt | Collapse-Binding Quantum Commitments Without Random Oracles | online |
2016 | asiacrypt | Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions | online |
2016 | asiacrypt | Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers | online |
2016 | ches | Obvious in Hindsight: From Side Channel Attacks to the Security Challenges Ahead | |
2016 | ches | Towards Easy Leakage Certification | 40-60 |
2016 | ches | Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications | 412-431 |
2016 | ches | Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis | 602-624 |
2016 | ches | EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ | 581-601 |
2016 | ches | Mitigating SAT Attack on Logic Locking | 127-146 |
2016 | ches | Run-Time Accessible DRAM PUFs in Commodity Devices | 432-453 |
2016 | ches | Strong 8-bit Sboxes with Efficient Masking in Hardware | 171-193 |
2016 | ches | Masking AES with d+1 Shares in Hardware | 194-212 |
2016 | ches | Strong Machine Learning Attack Against PUFs with No Mathematical Model | 391-411 |
2016 | ches | A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation | 538-558 |
2016 | ches | Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields | 517-537 |
2016 | ches | Physical Layer Group Key Agreement for Automotive Controller Area Networks | 85-105 |
2016 | ches | On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking | 457-478 |
2016 | ches | Correlated Extra-Reductions Defeat Blinded Regular Exponentiation | 3-22 |
2016 | ches | Reducing the Number of Non-linear Multiplications in Masking Schemes | 479-497 |
2016 | ches | Faster Evaluation of SBoxes via Common Shares | 498-514 |
2016 | ches | Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme | 23-39 |
2016 | ches | A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks | 625-647 |
2016 | ches | Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings | |
2016 | ches | QcBits: Constant-Time Small-Key Code-Based Cryptography | 280-300 |
2016 | ches | CacheBleed: A Timing Attack on OpenSSL Constant Time RSA | 346-367 |
2016 | ches | No Place to Hide: Contactless Probing of Secret Data on FPGAs | 147-167 |
2016 | ches | Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering | 559-577 |
2016 | ches | Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture | 237-256 |
2016 | ches | Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme | 323-345 |
2016 | ches | Cache Attacks Enable Bulk Key Recovery on the Cloud | 368-388 |
2016 | ches | \mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers | 301-320 |
2016 | ches | Software Implementation of Koblitz Curves over Quadratic Fields | 259-279 |
2016 | ches | - vatiCAN - Vetted, Authenticated CAN Bus | 106-124 |
2016 | ches | Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough | 215-236 |
2016 | ches | Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach | 61-81 |
2016 | crypto | A Practical Cryptanalysis of the Algebraic Eraser | 179-189 |
2016 | crypto | Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption | 491-520 |
2016 | crypto | Spooky Encryption and Its Applications | 93-122 |
2016 | crypto | Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results | 403-432 |
2016 | crypto | A 2^70 Attack on the Full MISTY1 | 435-456 |
2016 | crypto | Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications | 33-59 |
2016 | crypto | Circular Security Separations for Arbitrary Length Cycles from LWE | 681-700 |
2016 | crypto | XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees | 64-94 |
2016 | crypto | Linicrypt: A Model for Practical Cryptography | 416-445 |
2016 | crypto | Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II | |
2016 | crypto | Adaptively Secure Garbled Circuits from One-Way Functions | 149-178 |
2016 | crypto | Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks | 157-184 |
2016 | crypto | Cryptanalysis of the FLIP Family of Stream Ciphers | 457-475 |
2016 | crypto | Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security | 3-32 |
2016 | crypto | Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers | 33-63 |
2016 | crypto | Quantum Homomorphic Encryption for Polynomial-Sized Circuits | 3-32 |
2016 | crypto | Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems | 123-145 |
2016 | crypto | Cryptanalysis of GGH15 Multilinear Maps | 607-628 |
2016 | crypto | The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 | 247-276 |
2016 | crypto | Fine-Grained Cryptography | 533-562 |
2016 | crypto | The Magic of ELFs | 479-508 |
2016 | crypto | Obfuscation Combiners | 521-550 |
2016 | crypto | Network Oblivious Transfer | 366-396 |
2016 | crypto | Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE | 659-680 |
2016 | crypto | Bounded Indistinguishability and the Complexity of Recovering Secrets | 593-618 |
2016 | crypto | Probabilistic Termination and Composability of Cryptographic Protocols | 240-269 |
2016 | crypto | UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens | 208-239 |
2016 | crypto | Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines | 341-372 |
2016 | crypto | Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts | 190-213 |
2016 | crypto | On the Power of Secure Two-Party Computation | 397-429 |
2016 | crypto | Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes | 303-332 |
2016 | crypto | A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case | 277-307 |
2016 | crypto | (title unknown) | |
2016 | crypto | Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case | 543-571 |
2016 | crypto | Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead | |
2016 | crypto | Breaking Symmetric Cryptosystems Using Quantum Period Finding | 207-237 |
2016 | crypto | On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings | 449-477 |
2016 | crypto | Indifferentiability of 8-Round Feistel Networks | 95-120 |
2016 | crypto | The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS | 123-153 |
2016 | crypto | Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming | 387-415 |
2016 | crypto | Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem | 93-122 |
2016 | crypto | Efficiently Computing Data-Independent Memory-Hard Functions | 241-271 |
2016 | crypto | Semantic Security and Indistinguishability in the Quantum World | 60-89 |
2016 | crypto | Another View of the Division Property | 654-682 |
2016 | crypto | EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC | 121-149 |
2016 | crypto | Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 | 629-658 |
2016 | crypto | Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III | |
2016 | crypto | On Statistically Secure Obfuscation with Approximate Correctness | 551-578 |
2016 | crypto | FHE Circuit Privacy Almost for Free | 62-89 |
2016 | crypto | How to Prove Knowledge of Small Secrets | 478-498 |
2016 | crypto | Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices | 625-653 |
2016 | crypto | Two-Message, Oblivious Evaluation of Cryptographic Functionalities | 619-648 |
2016 | crypto | A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes | 153-178 |
2016 | crypto | Breaking the Circuit Size Barrier for Secure Computation Under DDH | 509-539 |
2016 | crypto | Secure Protocol Transformations | 430-458 |
2016 | crypto | On the Communication Required for Unconditionally Secure Multiplication | 459-488 |
2016 | crypto | Network-Hiding Communication and Applications to Multi-party Protocols | 335-365 |
2016 | crypto | New Insights on AES-Like SPN Ciphers | 605-624 |
2016 | crypto | Concurrent Non-Malleable Commitments (and More) in 3 Rounds | 270-299 |
2016 | crypto | Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I | |
2016 | crypto | Memory-Efficient Algorithms for Finding Needles in Haystacks | 185-206 |
2016 | crypto | Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium | 579-604 |
2016 | crypto | Big-Key Symmetric Encryption: Resisting Key Exfiltration | 373-402 |
2016 | crypto | TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption | 563-592 |
2016 | crypto | Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials | 499-530 |
2016 | crypto | Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN | 214-243 |
2016 | crypto | Encryption Switching Protocols | 308-338 |
2016 | crypto | Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems | 272-301 |
2016 | crypto | Rate-1, Linear Time and Additively Homomorphic UC Commitments | 179-207 |
2016 | crypto | Fully Secure Functional Encryption for Inner Products, from Standard Assumptions | 333-362 |
2016 | crypto | Optimal Security Proofs for Signatures from Identification Schemes | 33-61 |
2016 | crypto | ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks | 302-332 |
2016 | crypto | Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security | 363-384 |
2016 | crypto | Efficient Algorithms for Supersingular Isogeny Diffie-Hellman | 572-601 |
2016 | crypto | Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli | 3-32 |
2016 | eurocrypt | The Future of Cryptography | online |
2016 | eurocrypt | Engineering Code Obfuscation | online |
2016 | eurocrypt | Protecting Transport Layer Security from Legacy Vulnerabilities | online |
2016 | eurocrypt | Securing Cryptography Implementations in Embedded Systems | online |
2016 | eurocrypt | Reusable Fuzzy Extractors for Low-Entropy Distributions | online |
2016 | eurocrypt | New Negative Results on Differing-Inputs Obfuscation | online |
2016 | eurocrypt | Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption | online |
2016 | eurocrypt | On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model | online |
2016 | eurocrypt | On the Size of Pairing-Based Non-interactive Arguments | online |
2016 | eurocrypt | Unconditionally Secure Computation with Reduced Interaction | online |
2016 | eurocrypt | On the Power of Hierarchical Identity-Based Encryption | online |
2016 | eurocrypt | Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model | online |
2016 | eurocrypt | Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits | online |
2016 | eurocrypt | Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning | online |
2016 | eurocrypt | Polytopic Cryptanalysis | online |
2016 | eurocrypt | An Analysis of OpenSSL's Random Number Generator | online |
2016 | eurocrypt | Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II | |
2016 | eurocrypt | Valiant's Universal Circuit is Practical | online |
2016 | eurocrypt | Online/Offline OR Composition of Sigma Protocols | online |
2016 | eurocrypt | Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems | online |
2016 | eurocrypt | Two Round Multiparty Computation via Multi-key FHE | 735-763 |
2016 | eurocrypt | Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator | online |
2016 | eurocrypt | Nonce-Based Cryptography: Retaining Security When Randomness Fails | online |
2016 | eurocrypt | Secure Computation from Elastic Noisy Channels | online |
2016 | eurocrypt | Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions | online |
2016 | eurocrypt | Cryptanalysis of the New CLT Multilinear Map over the Integers | online |
2016 | eurocrypt | Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key | online |
2016 | eurocrypt | Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS | online |
2016 | eurocrypt | Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 | online |
2016 | eurocrypt | Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis | online |
2016 | eurocrypt | Randomness Complexity of Private Circuits for Multiplication | online |
2016 | eurocrypt | All Complete Functionalities are Reversible | online |
2016 | eurocrypt | New Attacks on the Concatenation and XOR Hash Combiners | online |
2016 | eurocrypt | Essentially Optimal Robust Secret Sharing with Maximal Corruptions | online |
2016 | eurocrypt | Provably Weak Instances of Ring-LWE Revisited | online |
2016 | eurocrypt | Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance | online |
2016 | eurocrypt | Circuit Compilers with O(1/\log (n)) Leakage Rate | online |
2016 | eurocrypt | From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces | online |
2016 | eurocrypt | 10-Round Feistel is Indifferentiable from an Ideal Cipher | online |
2016 | eurocrypt | Computationally Binding Quantum Commitments | online |
2016 | eurocrypt | Recovering Short Generators of Principal Ideals in Cyclotomic Rings | online |
2016 | eurocrypt | On the Influence of Message Length in PMAC's Security Bounds | online |
2016 | eurocrypt | Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts | online |
2016 | eurocrypt | Constrained Pseudorandom Functions for Unconstrained Inputs | online |
2016 | eurocrypt | Tightly CCA-Secure Encryption Without Pairings | online |
2016 | eurocrypt | Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting | online |
2016 | eurocrypt | Faster Algorithms for Solving LPN | online |
2016 | eurocrypt | The Exact Round Complexity of Secure Computation | online |
2016 | eurocrypt | New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields | online |
2016 | eurocrypt | On the Impossibility of Tight Cryptographic Reductions | online |
2016 | eurocrypt | Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters | online |
2016 | eurocrypt | Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN | online |
2016 | eurocrypt | Complete Addition Formulas for Prime Order Elliptic Curves | online |
2016 | eurocrypt | Indifferentiability of Confusion-Diffusion Networks | online |
2016 | eurocrypt | Provably Robust Sponge-Based PRNGs and KDFs | online |
2016 | eurocrypt | Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters | online |
2016 | eurocrypt | Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits | online |
2016 | eurocrypt | Cryptanalysis of GGH Map | online |
2016 | eurocrypt | Practical, Predictable Lattice Basis Reduction | online |
2016 | eurocrypt | Freestart Collision for Full SHA-1 | online |
2016 | eurocrypt | Honey Encryption Beyond Message Recovery Security | online |
2016 | eurocrypt | Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes | online |
2016 | eurocrypt | Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors | online |
2016 | eurocrypt | Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I | |
2016 | eurocrypt | Fair and Robust Multi-party Computation Using a Global Transaction Ledger | online |
2016 | eurocrypt | Hash-Function Based PRFs: AMAC and Its Multi-User Security | online |
2016 | eurocrypt | On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments | online |
2016 | eurocrypt | Sanitization of FHE Ciphertexts | online |
2016 | fse | Low entropy crypto | |
2016 | fse | On White-Box Cryptography | |
2016 | fse | Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE | online |
2016 | fse | Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC | online |
2016 | fse | Cryptanalysis of the Full Spritz Stream Cipher | online |
2016 | fse | Detecting Flawed Masking Schemes with Leakage Detection Tests | online |
2016 | fse | Optimizing S-Box Implementations for Several Criteria Using SAT Solvers | online |
2016 | fse | Modeling Random Oracles Under Unpredictable Queries | online |
2016 | fse | Bit-Based Division Property and Application to Simon Family | online |
2016 | fse | Key Recovery Attack Against 2.5-Round \pi -Cipher | online |
2016 | fse | Cryptanalysis of Reduced NORX | online |
2016 | fse | Attacks Against Filter Generators Exploiting Monomial Mappings | online |
2016 | fse | Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression | online |
2016 | fse | Algebraic Insights into the Secret Feistel Network | online |
2016 | fse | Practical Order-Revealing Encryption with Limited Leakage | online |
2016 | fse | Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques | online |
2016 | fse | Lightweight MDS Generalized Circulant Matrices | online |
2016 | fse | Strengthening the Known-Key Security Notion for Block Ciphers | online |
2016 | fse | MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck | online |
2016 | fse | Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers | |
2016 | fse | Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants | online |
2016 | fse | Efficient Design Strategies Based on the AES Round Function | online |
2016 | fse | Analysis of the Kupyna-256 Hash Function | online |
2016 | fse | White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels - | online |
2016 | fse | A MAC Mode for Lightweight Block Ciphers | online |
2016 | fse | New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length | online |
2016 | fse | There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks | online |
2016 | fse | Note on Impossible Differential Attacks | online |
2016 | fse | RIV for Robust Authenticated Encryption | online |
2016 | fse | Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck | online |
2016 | fse | Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications | 514-532 |
2016 | fse | On the Construction of Lightweight Circulant Involutory MDS Matrices | online |
2016 | jofc | Secret-Sharing Schemes for Very Dense Graphs | 336-362 |
2016 | jofc | Structure-Preserving Signatures and Commitments to Group Elements | 363-421 |
2016 | jofc | Fast Cryptography in Genus 2 | 28-60 |
2016 | jofc | An Optimally Fair Coin Toss | 491-513 |
2016 | jofc | Leakage-Resilient Cryptography from Minimal Assumptions | 514-551 |
2016 | jofc | The ℚ-curve Construction for Endomorphism-Accelerated Elliptic Curves | 806-832 |
2016 | jofc | Automata Evaluation and Text Search Protocols with Simulation-Based Security | 243-282 |
2016 | jofc | Efficient Set Intersection with Simulation-Based Security | 115-155 |
2016 | jofc | Cryptanalysis of Full RIPEMD-128 | 927-951 |
2016 | jofc | Concurrent Knowledge Extraction in Public-Key Models | 156-219 |
2016 | jofc | Signature Schemes Secure Against Hard-to-Invert Leakage | 422-455 |
2016 | jofc | New Second-Preimage Attacks on Hash Functions | 657-696 |
2016 | jofc | How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction | 61-114 |
2016 | jofc | Bug Attacks | 775-805 |
2016 | jofc | Unconditionally Anonymous Ring and Mesh Signatures | 729-774 |
2016 | jofc | Tightly Secure Signatures From Lossy Identification Schemes | 597-631 |
2016 | jofc | Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes | 697-728 |
2016 | jofc | Breaking RSA May Be As Difficult As Factoring | 220-241 |
2016 | jofc | Practical Cryptanalysis of ISO 9796-2 and EMV Signatures | 632-656 |
2016 | jofc | Enhanced Public Key Security for the McEliece Cryptosystem | 1-27 |
2016 | jofc | Garbling XOR Gates "For Free" in the Standard Model | 552-576 |
2016 | jofc | A Dichotomy for Local Small-Bias Generators | 577-596 |
2016 | jofc | Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions | 833-878 |
2016 | jofc | Toward a Game Theoretic View of Secure Computation | 879-926 |
2016 | jofc | Limits on the Usefulness of Random Oracles | 283-335 |
2016 | jofc | Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries | 456-490 |
2016 | pkc | Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models | online |
2016 | pkc | Universally Composable Direct Anonymous Attestation | 234-264 |
2016 | pkc | Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields | online |
2016 | pkc | Chosen-Ciphertext Security from Subset Sum | online |
2016 | pkc | Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys | online |
2016 | pkc | Deniable Functional Encryption | online |
2016 | pkc | On Public Key Encryption from Noisy Codewords | online |
2016 | pkc | Mitigating Multi-target Attacks in Hash-Based Signatures | online |
2016 | pkc | Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1 | online |
2016 | pkc | Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II | |
2016 | pkc | Nearly Optimal Verifiable Data Streaming | online |
2016 | pkc | Universally Composable Authentication and Key-Exchange with Global PKI | online |
2016 | pkc | Identity-Based Cryptosystems and Quadratic Residuosity | online |
2016 | pkc | Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles | online |
2016 | pkc | On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes | online |
2016 | pkc | Non-Malleable Functions and Their Applications | online |
2016 | pkc | Functional Encryption for Inner Product with Full Function Privacy | online |
2016 | pkc | On the Hardness of Proving CCA-Security of Signed ElGamal | online |
2016 | pkc | CCA-Secure Keyed-Fully Homomorphic Encryption | online |
2016 | pkc | Extended Nested Dual System Groups, Revisited | online |
2016 | pkc | Robust Secret Sharing Schemes Against Local Adversaries | online |
2016 | pkc | Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness | online |
2016 | pkc | Attribute-Based Signatures for Circuits from Bilinear Map | online |
2016 | pkc | ARMed SPHINCS - Computing a 41 KB Signature in 16 KB of RAM | online |
2016 | pkc | Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security | online |
2016 | pkc | Leakage-Resilient Public-Key Encryption from Obfuscation | online |
2016 | pkc | Indistinguishability Obfuscation with Non-trivial Efficiency | 447-462 |
2016 | pkc | Fault-Tolerant Aggregate Signatures | online |
2016 | pkc | Very-Efficient Simulatable Flipping of Many Coins into a Well - (and a New Universally-Composable Commitment Scheme) | online |
2016 | pkc | Delegatable Functional Signatures | online |
2016 | pkc | Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I | |
2016 | pkc | How to Generalize RSA Cryptanalyses | online |
2016 | pkc | KDM-Security via Homomorphic Smooth Projective Hashing | online |
2016 | pkc | On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions | online |
2016 | pkc | Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE) | online |
2016 | pkc | Asynchronous Secure Multiparty Computation in Constant Time | online |
2016 | pkc | The Many Faces of Garbled Circuits | |
2016 | pkc | Future Directions in Lattice Cryptography | |
2016 | pkc | The first 10 years of Curve25519 | |
2016 | tcc | Efficient Secure Multiparty Computation with Identifiable Abort | 461-490 |
2016 | tcc | Pseudoentropy: Lower-Bounds for Chain Rules and Transformations | 183-203 |
2016 | tcc | Strong Hardness of Privacy from Weak Traitor Tracing | 659-689 |
2016 | tcc | Towards Non-Black-Box Separations of Public Key Encryption and One Way Function | 169-191 |
2016 | tcc | Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity | 367-399 |
2016 | tcc | Semi-adaptive Security and Bundling Functionalities Made Generic and Easy | 361-388 |
2016 | tcc | Secure Obfuscation in a Weak Multilinear Map Model | 241-268 |
2016 | tcc | Separating Computational and Statistical Differential Privacy in the Client-Server Model | 607-634 |
2016 | tcc | Delegating RAM Computations | 91-118 |
2016 | tcc | On the (In)Security of SNARKs in the Presence of Oracles | 108-138 |
2016 | tcc | 3-Message Zero Knowledge Against Human Ignorance | 57-83 |
2016 | tcc | Targeted Homomorphic Attribute-Based Encryption | 330-360 |
2016 | tcc | Cross and Clean: Amortized Garbled Circuits with Constant Overhead | 582-603 |
2016 | tcc | Proof of Space from Stacked Expanders | 262-285 |
2016 | tcc | The GGM Function Family Is a Weakly One-Way Family of Functions | 84-107 |
2016 | tcc | Interactive Oracle Proofs | 31-60 |
2016 | tcc | Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious | 307-335 |
2016 | tcc | Threshold Secret Sharing Requires a Linear Size Alphabet | 471-484 |
2016 | tcc | Simulating Auxiliary Inputs, Revisited | 159-179 |
2016 | tcc | Single-Key to Multi-Key Functional Encryption with Polynomial Loss | 419-442 |
2016 | tcc | Secure Multiparty RAM Computation in Constant Rounds | 491-520 |
2016 | tcc | Adaptive Security of Yao's Garbled Circuits | 433-458 |
2016 | tcc | Binary AMD Circuits from Secure Multiparty Computation | 336-366 |
2016 | tcc | Perfectly Secure Message Transmission in Two Rounds | 286-304 |
2016 | tcc | Compactness vs Collusion Resistance in Functional Encryption | 443-468 |
2016 | tcc | Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions | 400-432 |
2016 | tcc | From Indifferentiability to Constructive Cryptography (and Back) | 3-24 |
2016 | tcc | Leakage Resilient One-Way Functions: The Auxiliary-Input Setting | 139-158 |
2016 | tcc | Deniable Attribute Based Encryption for Branching Programs from LWE | 299-329 |
2016 | tcc | Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents | 269-296 |
2016 | tcc | Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II | |
2016 | tcc | More Efficient Constant-Round Multi-party Computation from BMR and SHE | 554-581 |
2016 | tcc | Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds | 635-658 |
2016 | tcc | Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key Agreement | 204-234 |
2016 | tcc | Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I | |
2016 | tcc | Constant-Round Maliciously Secure Two-Party Computation in the RAM Model | 521-553 |
2016 | tcc | Delegating RAM Computations with Adaptive Soundness and Privacy | 3-30 |
2016 | tcc | Fast Pseudorandom Functions Based on Expander Graphs | 27-56 |
2016 | tcc | Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond | 517-546 |
2016 | tcc | Simultaneous Secrecy and Reliability Amplification for a General Channel Model | 235-261 |
2016 | tcc | From Cryptomania to Obfustopia Through Secret-Key Functional Encryption | 391-418 |
2016 | tcc | Standard Security Does Not Imply Indistinguishability Under Selective Opening | 121-145 |
2016 | tcc | Adaptive Succinct Garbled RAM or: How to Delegate Your Database | 61-90 |
2016 | tcc | Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms | 192-216 |
2016 | tcc | Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts | 146-168 |
2016 | tcc | Access Control Encryption: Enforcing Information Flow with Cryptography | 547-576 |
2016 | tcc | How to Share a Secret, Infinitely | 485-514 |
2016 | tcc | Multi-key FHE from LWE, Revisited | 217-238 |
2016 | tcc | Homomorphic Evaluation Requires Depth | online |
2016 | tcc | Reconfigurable Cryptography: A Flexible Approach to Long-Term Security | online |
2016 | tcc | Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits | online |
2016 | tcc | On Constructing One-Way Permutations from Indistinguishability Obfuscation | online |
2016 | tcc | Rational Sumchecks | online |
2016 | tcc | A Study of Pair Encodings: Predicate Encryption in Prime Order Groups | online |
2016 | tcc | Contention in Cryptoland: Obfuscation, Leakage and UCE | online |
2016 | tcc | Point-Function Obfuscation: A Framework and Generic Constructions | online |
2016 | tcc | Order-Revealing Encryption and the Hardness of Private Learning | online |
2016 | tcc | Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings | online |
2016 | tcc | A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles | online |
2016 | tcc | Multilinear Maps from Obfuscation | online |
2016 | tcc | The Complexity of Computing the Optimal Composition of Differential Privacy | online |
2016 | tcc | On the Complexity of Additively Homomorphic UC Commitments | online |
2016 | tcc | Interactive Coding for Interactive Proofs | online |
2016 | tcc | Improved OR-Composition of Sigma-Protocols | online |
2016 | tcc | Functional Encryption for Turing Machines | online |
2016 | tcc | Oblivious Parallel RAM and Applications | online |
2016 | tcc | Perfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation | online |
2016 | tcc | Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM | online |
2016 | tcc | Information-Theoretic Local Non-malleable Codes and Their Applications | online |
2016 | tcc | How to Avoid Obfuscation Using Witness PRFs | online |
2016 | tcc | Non-Malleable Encryption: Simpler, Shorter, Stronger | online |
2016 | tcc | On the Correlation Intractability of Obfuscated Pseudorandom Functions | online |
2016 | tcc | Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs | online |
2016 | tcc | On Basing Private Information Retrieval on NP-Hardness | online |
2016 | tcc | Cutting-Edge Cryptography Through the Lens of Secret Sharing | online |
2016 | tcc | Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II | |
2016 | tcc | On the Hardness of Learning with Rounding over Small Modulus | online |
2016 | tcc | Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography | online |
2016 | tcc | Verifiable Random Functions from Standard Assumptions | online |
2016 | tcc | From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back | online |
2016 | tcc | Cryptographic Assumptions: A Position Paper | 505-522 |
2016 | tcc | On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models | online |
2016 | tcc | Oblivious Parallel RAM: Improved Efficiency and Generic Constructions | online |
2016 | tcc | Characterization of Secure Multiparty Computation Without Broadcast | online |
2016 | tcc | Adaptive Security with Quasi-Optimal Rate | online |
2016 | tcc | Optimal Computational Split-state Non-malleable Codes | online |
2016 | tcc | Optimal Amplification of Noisy Leakages | online |
2016 | tcc | Output-Compressing Randomized Encodings and Applications | online |
2016 | tcc | Differential Privacy: Ten Years of Making Noise | |
2016 | tcc | Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I | |
2016 | tcc | Non-Malleable Codes | |
2016 | tcc | Indistinguishability Obfuscation: From Approximate to Exact | online |
2016 | tcc | Through the Looking Glass: What Cryptography Should Do for Alice | |
2016 | tcc | Simplified Universal Composability Framework | online |
2016 | tcc | Secure Hardware and Cryptography: Contrasts, Challenges and Opportunities | |
2016 | tcc | Functional Encryption Without Obfuscation | online |
2016 | tcc | Lower Bounds on Assumptions Behind Indistinguishability Obfuscation | online |
2016 | tcc | Déjà Q: Encore! Un Petit IBE | online |
2016 | tcc | Standard Security Does Imply Security Against Selective Opening for Markov Distributions | online |
2016 | tcc | Two-Round Man-in-the-Middle Security from LPN | online |
2016 | tosc | Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks? | online |
2016 | tosc | Rotational Cryptanalysis in the Presence of Constants | online |
2016 | tosc | Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications | online |
2016 | tosc | Cryptanalysis of Haraka | online |
2016 | tosc | OleF: an Inverse-Free Online Cipher. An Online SPRP with an Optimal Inverse-Free Construction | online |
2016 | tosc | Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog | online |
2016 | tosc | Practical Key-Recovery Attack on MANTIS5 | online |
2016 | tosc | Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis | online |
2016 | tosc | Subspace Trail Cryptanalysis and its Applications to AES | online |
2016 | tosc | Lightweight Diffusion Layer: Importance of Toeplitz Matrices | online |
2016 | tosc | Quantum Differential and Linear Cryptanalysis | online |
2016 | tosc | Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs | online |
2016 | tosc | Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions | online |
2016 | tosc | Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs | online |
2016 | tosc | Stronger Security Variants of GCM-SIV | online |
2016 | tosc | Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models | online |
2016 | tosc | On Ciphers that Continuously Access the Non-Volatile Key | online |
2016 | tosc | Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha | online |
2016 | tosc | Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP | online |
2016 | tosc | Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes | online |
2016 | tosc | Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes | online |
2016 | tosc | The Exact Security of PMAC | online |
2016 | tosc | Security Analysis of BLAKE2's Modes of Operation | online |