Year | Title | Venue |

2016 | New Negative Results on Differing-Inputs Obfuscation | eurocrypt |

2016 | Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption | eurocrypt |

2016 | On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model | eurocrypt |

2016 | On the Size of Pairing-Based Non-interactive Arguments | eurocrypt |

2016 | Unconditionally Secure Computation with Reduced Interaction | eurocrypt |

2016 | On the Power of Hierarchical Identity-Based Encryption | eurocrypt |

2016 | Online/Offline OR Composition of Sigma Protocols | eurocrypt |

2016 | Secure Computation from Elastic Noisy Channels | eurocrypt |

2016 | Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions | eurocrypt |

2016 | Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key | eurocrypt |

2016 | All Complete Functionalities are Reversible | eurocrypt |

2016 | Essentially Optimal Robust Secret Sharing with Maximal Corruptions | eurocrypt |

2016 | Provably Weak Instances of Ring-LWE Revisited | eurocrypt |

2016 | Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance | eurocrypt |

2016 | From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces | eurocrypt |

2016 | Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts | eurocrypt |

2016 | Tightly CCA-Secure Encryption Without Pairings | eurocrypt |

2016 | Faster Algorithms for Solving LPN | eurocrypt |

2016 | The Exact Round Complexity of Secure Computation | eurocrypt |

2016 | On the Impossibility of Tight Cryptographic Reductions | eurocrypt |

2016 | Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters | eurocrypt |

2016 | Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN | eurocrypt |

2016 | Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes | eurocrypt |

2016 | Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors | eurocrypt |

2016 | Sanitization of FHE Ciphertexts | eurocrypt |

2016 | Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning | eurocrypt |

2016 | Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems | eurocrypt |

2016 | Two Round Multiparty Computation via Multi-key FHE | eurocrypt |

2016 | Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator | eurocrypt |

2016 | Randomness Complexity of Private Circuits for Multiplication | eurocrypt |

2016 | New Attacks on the Concatenation and XOR Hash Combiners | eurocrypt |

2016 | Circuit Compilers with O(1/\log (n)) Leakage Rate | eurocrypt |

2016 | Computationally Binding Quantum Commitments | eurocrypt |

2016 | Recovering Short Generators of Principal Ideals in Cyclotomic Rings | eurocrypt |

2016 | Constrained Pseudorandom Functions for Unconstrained Inputs | eurocrypt |

2016 | Indifferentiability of Confusion-Diffusion Networks | eurocrypt |

2016 | Freestart Collision for Full SHA-1 | eurocrypt |

2016 | Fair and Robust Multi-party Computation Using a Global Transaction Ledger | eurocrypt |

2016 | Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model | eurocrypt |

2016 | Provably Robust Sponge-Based PRNGs and KDFs | eurocrypt |

2016 | Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters | eurocrypt |

2016 | Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits | eurocrypt |

2016 | Cryptanalysis of GGH Map | eurocrypt |

2016 | Practical, Predictable Lattice Basis Reduction | eurocrypt |

2016 | Honey Encryption Beyond Message Recovery Security | eurocrypt |

2016 | Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I | eurocrypt |

2016 | Hash-Function Based PRFs: AMAC and Its Multi-User Security | eurocrypt |

2016 | On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments | eurocrypt |

2016 | 10-Round Feistel is Indifferentiable from an Ideal Cipher | eurocrypt |

2016 | On the Influence of Message Length in PMAC's Security Bounds | eurocrypt |

2016 | Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting | eurocrypt |

2016 | New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields | eurocrypt |

2016 | Complete Addition Formulas for Prime Order Elliptic Curves | eurocrypt |

2016 | Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits | eurocrypt |

2016 | Polytopic Cryptanalysis | eurocrypt |

2016 | An Analysis of OpenSSL's Random Number Generator | eurocrypt |

2016 | Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II | eurocrypt |

2016 | Valiant's Universal Circuit is Practical | eurocrypt |

2016 | Nonce-Based Cryptography: Retaining Security When Randomness Fails | eurocrypt |

2016 | Cryptanalysis of the New CLT Multilinear Map over the Integers | eurocrypt |

2016 | Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS | eurocrypt |

2016 | Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 | eurocrypt |

2016 | Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis | eurocrypt |

2016 | Reusable Fuzzy Extractors for Low-Entropy Distributions | eurocrypt |

2014 | Solving LPN Using Covering Codes | asiacrypt |

2014 | EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor | ches |

2014 | Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes | fse |

2014 | Differential-Linear Cryptanalysis Revisited | fse |

2014 | A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic | eurocrypt |

2014 | Unifying Leakage Models: From Probing Attacks to Noisy Leakage | eurocrypt |

2014 | Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers | fse |

2013 | Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers | fse |

2015 | New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application | eprint |

2015 | Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting | eprint |

2015 | Zero-Knowledge Interactive Proof Systems for New Lattice Problems | eprint |

2015 | On the security margin of MAC striping | eprint |

2015 | Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version) | eprint |

2015 | Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes | eprint |

2015 | On the Equivalence of Obfuscation and Multilinear Maps | eprint |

2015 | Generalised tally-based decoders for traitor tracing and group testing | eprint |

2015 | A More Cautious Approach to Security Against Mass Surveillance | eprint |

2015 | More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries | eprint |

2015 | Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency | eprint |

2015 | Optimally Secure Block Ciphers from Ideal Primitives | eprint |

2015 | Quantum Cryptanalysis of NTRU | eprint |

2015 | On weak and strong 2^{k}-bent Boolean functions | eprint |

2015 | An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities | eprint |

2015 | Fast and Secure Linear Regression and Biometric Authentication with Security Update | eprint |

2015 | Adaptive Proofs of Knowledge in the Random Oracle Model | eprint |

2015 | Recovering Short Generators of Principal Ideals in Cyclotomic Rings | eprint |

2015 | Secure Computation of MIPS Machine Code | eprint |

2015 | One-key Double-Sum MAC with Beyond-Birthday Security | eprint |

2015 | Privacy-preserving Attribute Based Searchable Encryption | eprint |

2015 | Strongly Secure Authenticated Key Exchange from Ideal Lattices | eprint |

2015 | Reconfigurable Cryptography: A flexible approach to long-term security | eprint |

2015 | Inception Makes Non-malleable Codes Stronger | eprint |

2015 | Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme | eprint |

2015 | Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp | eprint |

2015 | TESLA: Tightly-Secure Efficient Signatures from Standard Lattices | eprint |

2015 | Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography | eprint |