Year | Title | Venue |

2013 | Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces | asiacrypt |

2013 | Candidate Multilinear Maps from Ideal Lattices | eurocrypt |

2013 | On the Function Field Sieve and the Impact of Higher Splitting Probabilities | crypto |

2013 | Counter-cryptanalysis: reconstructing Flame's new variant collision attack | crypto |

2013 | Lambda Coordinates for Binary Elliptic Curves | ches |

2013 | Locally Computable UOWHF with Linear Shrinkage | eurocrypt |

2013 | Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists | eurocrypt |

2013 | Regularity of Lossy RSA on Subdomains and Its Applications | eurocrypt |

2013 | How to Garble RAM Programs | eurocrypt |

2013 | MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions | eurocrypt |

2013 | Amplification of Chosen-Ciphertext Security | eurocrypt |

2013 | Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions | eurocrypt |

2013 | Practical Homomorphic MACs for Arithmetic Circuits | eurocrypt |

2013 | Streaming Authenticated Data Structures | eurocrypt |

2013 | Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields | eurocrypt |

2013 | How to Watermark Cryptographic Functions | eurocrypt |

2013 | Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption | eurocrypt |

2013 | Practical Signatures from Standard Assumptions | eurocrypt |

2013 | Message-Locked Encryption and Secure Deduplication | eurocrypt |

2013 | Improving Local Collisions: New Attacks on Reduced SHA-256 | eurocrypt |

2013 | Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions | eurocrypt |

2013 | Circular Chosen-Ciphertext Security with Compact Ciphertexts | eurocrypt |

2013 | Efficient Cryptosystems from 2^{ k }-th Power Residue Symbols | eurocrypt |

2013 | Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem | eurocrypt |

2013 | Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions | eurocrypt |

2013 | A Toolkit for Ring-LWE Cryptography | eurocrypt |

2013 | Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings | eurocrypt |

2013 | Dynamic Proofs of Retrievability via Oblivious RAM | eurocrypt |

2013 | Keccak | eurocrypt |

2013 | Masking against Side-Channel Attacks: A Formal Security Proof | eurocrypt |

2013 | New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis | eurocrypt |

2013 | One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games | eurocrypt |

2013 | Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction | eurocrypt |

2013 | Resource-Restricted Indifferentiability | eurocrypt |

2013 | Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures | eurocrypt |

2013 | How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation | eurocrypt |

2013 | Lossy Codes and a New Variant of the Learning-With-Errors Problem | eurocrypt |

2013 | Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting | eurocrypt |

2013 | On Concurrently Secure Computation in the Multiple Ideal Query Model | eurocrypt |

2013 | Fast Cryptography in Genus 2 | eurocrypt |

2013 | Batch Fully Homomorphic Encryption over the Integers | eurocrypt |

2013 | Cryptanalysis of Full RIPEMD-128 | eurocrypt |

2013 | Leakage-Resilient Cryptography from Minimal Assumptions | eurocrypt |

2013 | Quantum-Secure Message Authentication Codes | eurocrypt |

2013 | New Links between Differential and Linear Cryptanalysis | eurocrypt |

2013 | Quadratic Span Programs and Succinct NIZKs without PCPs | eurocrypt |

2013 | Security Evaluations beyond Computing Power | eurocrypt |

2013 | Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter | asiacrypt |

2013 | Key Difference Invariant Bias in Block Ciphers | asiacrypt |

2013 | Random Projections, Graph Sparsification, and Differential Privacy | asiacrypt |

2013 | Reset Indifferentiability and Its Consequences | asiacrypt |

2013 | Functional Encryption from (Small) Hardware Tokens | asiacrypt |

2013 | Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency | asiacrypt |

2013 | Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments | asiacrypt |

2013 | Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests | asiacrypt |

2013 | Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters | asiacrypt |

2013 | Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique - (Extended Abstract) | asiacrypt |

2013 | Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier | asiacrypt |

2013 | Function-Private Subspace-Membership Encryption and Its Applications | asiacrypt |

2013 | Four-Dimensional GLV via the Weil Restriction | asiacrypt |

2013 | Generic Key Recovery Attack on Feistel Scheme | asiacrypt |

2013 | Computational Fuzzy Extractors | asiacrypt |

2013 | How to Construct an Ideal Cipher from a Small Set of Public Permutations | asiacrypt |

2013 | Discrete Gaussian Leftover Hash Lemma over Infinite Domains | asiacrypt |

2013 | Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization | asiacrypt |

2013 | Constrained Pseudorandom Functions and Their Applications | asiacrypt |

2013 | Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited | asiacrypt |

2013 | On Diamond Structures and Trojan Message Attacks | asiacrypt |

2013 | New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography | asiacrypt |

2013 | Unconditionally Secure and Universally Composable Commitments from Physical Assumptions | asiacrypt |

2013 | Building Lossy Trapdoor Functions from Lossy Encryption | asiacrypt |

2013 | Lattice-Based Group Signatures with Logarithmic Signature Size | asiacrypt |

2013 | Cryptanalysis of HMAC/NMAC-Whirlpool | asiacrypt |

2013 | Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I | asiacrypt |

2013 | Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes | asiacrypt |

2013 | Parallelizable and Authenticated Online Ciphers | asiacrypt |

2013 | A Heuristic for Finding Compatible Differential Paths with Application to HAS-160 | asiacrypt |

2013 | Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful | asiacrypt |

2013 | A Modular Framework for Building Variable-Input-Length Tweakable Ciphers | asiacrypt |

2013 | SCARE of Secret Ciphers with SPN Structures | asiacrypt |

2013 | Tamper Resilient Circuits: The Adversary at the Gates | asiacrypt |

2013 | Between a Rock and a Hard Place: Interpolating between MPC and FHE | asiacrypt |

2013 | Constant-Round Concurrent Zero Knowledge in the Bounded Player Model | asiacrypt |

2013 | Fully Homomorphic Message Authenticators | asiacrypt |

2013 | New Generic Attacks against Hash-Based MACs | asiacrypt |

2013 | Fair and Efficient Secure Multiparty Computation with Reputation Systems | asiacrypt |

2013 | Families of Fast Elliptic Curves from ℚ-curves | asiacrypt |

2013 | Notions of Black-Box Reductions, Revisited | asiacrypt |

2013 | SPHF-Friendly Non-interactive Commitments | asiacrypt |

2013 | Efficient General-Adversary Multi-Party Computation | asiacrypt |

2013 | Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild | asiacrypt |

2013 | Behind the Scene of Side Channel Attacks | asiacrypt |

2013 | Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 | asiacrypt |

2013 | Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE | asiacrypt |

2013 | The Fiat-Shamir Transformation in a Quantum World | asiacrypt |

2013 | On Continual Leakage of Discrete Log Representations | asiacrypt |

2013 | Improved Cryptanalysis of Reduced RIPEMD-160 | asiacrypt |

2013 | Naturally Rehearsing Passwords | asiacrypt |

2013 | Hiding the Input-Size in Secure Two-Party Computation | asiacrypt |

2013 | Non-uniform Cracks in the Concrete: The Power of Free Precomputation | asiacrypt |