Eurocrypt 2015
26 - 30 April 2015
Sofia, Bulgaria
EUROCRYPT 2015




  • Itai Dinur; Pawel Morawiecki; Josef Pieprzyk; Marian Srebrny; Michal Straus; Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function

  • Dominique Unruh; Non-interactive zero-knowledge proofs in the quantum random oracle model

  • Aaram Yun; Generic Hardness of the Multiple Discrete Logarithm Problem

  • Koji Nuida; Kaoru Kurosawa; (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces

  • Tore Kasper Frederiksen; Jesper Buus Nielsen; Claudio Orlandi; Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge

  • Razvan Barbulescu; Pierrick Gaudry; Aurore Guillevic; François Morain; Improving NFS for the discrete logarithm problem in non-prime finite fields

  • Thomas Shrimpton; R. Seth Terashima; A Provable-Security Analysis of Intel's Secure Key RNG

  • Gilad Asharov; Yehuda Lindell; Thomas Schneider; Michael Zohner; More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries

  • Anne Canteaut; Joëlle Roué; On the behaviors of affine equivalent Sboxes regarding differential and linear attacks

  • Alexander May; Ilya Ozerov; On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes

  • Benoit Cogliati; Yannick Seurin; On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks

  • Cécile Pierrot; The Multiple Number Field Sieve with Conjugation and Generalized Joux-Lercier Methods

  • Itai Dinur; Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE

  • Ilya Mironov; Noah Stephens-Davidowitz; Cryptographic Reverse Firewalls

  • Gregor Leander; Brice Minaud; Sondre Rønjom; A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro

  • Xianhui Lu; Bao Li; Dingding Jia; KDM-CCA Security from RKA Secure Authenticated Encryption

  • Léo Ducas; Daniele Micciancio; FHEW: Bootstrapping in less than a second

  • Viet Tung Hoang; Ted Krovetz; Phillip Rogaway; Robust Authenticated-Encryption: AEZ and the Problem that it Solves

  • Jung Hee Cheon; Damien Stehle; Fully Homomophic Encryption over the Integers Revisited

  • Michel Abdalla; Fabrice Benhamouda; David Pointcheval; Disjunctions for Hash Proof Systems: New Constructions and Applications

  • Eike Kiltz; Hoeteck Wee; Quasi-Adaptive NIZK for Linear Subspaces Revisited

  • Yosuke Todo; Structural Evaluation by Generalized Integral Property

  • Ronald Cramer; Ivan Damgaard; Nico Doettling; Serge Fehr; Gabriele Spini; Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions

  • Achiya Bar-On; Itai Dinur; Orr Dunkelman; Nathan Keller; Virginie Lallemand; Boaz Tsaban; Cryptanalysis of SP Networks with Partial Non-Linear Layers

  • Gaëtan Leurent; Lei Wang; The Sum Can Be Weaker Than Each Part

  • Alessandro Chiesa; Eran Tromer; Madars Virza; Cluster Computing in Zero Knowledge

  • Susan Hohenberger; Venkata Koppula; Brent Waters; Universal Signature Aggregators

  • Dan Boneh; Kevin Lewi; Mariana Raykova; Amit Sahai; Mark Zhandry; Joe Zimmerman; Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation

  • Stefan Dziembowski; Sebastian Faust; Maciej Skórski; Noisy Leakage Revisited

  • Samee Zahur; Mike Rosulek; David Evans; Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates

  • Shai Halevi; Victor Shoup; Bootstrapping for HElib

  • Mihir Bellare; Viet Tung Hoang; Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model

  • Alexandre Duc; Sebastian Faust; François-Xavier Standaert; Making Masking Security Proofs Concrete (Or How to Evaluate the Security of any Leaking Device)

  • Yi-Kai Liu; Privacy Amplification in the Isolated Qubits Model

  • Arash Afshar; Zhangxiang Hu; Payman Mohassel; Mike Rosulek; How to Efficiently Evaluate RAM Programs with Malicious Security

  • Daniel J. Bernstein; Daira Hopwood; Andreas Hülsing; Tanja Lange; Ruben Niederhagen; Louiza Papachristodoulou; Michael Schneider; Peter Schwabe; Zooko Wilcox O'Hearn; SPHINCS: practical stateless hash-based signatures

  • Dana Dachman-Soled; Feng-Hao Liu; Hong-Sheng Zhou; Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware

  • Gilles Barthe; Yassine Lakhnech; Juan Manuel Crespo; Benedikt Schmidt; Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols

  • Shashank Agrawal; Shweta Agrawal; Manoj Prabhakaran; Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data

  • Alexandre Duc; Florian Tramèr; Serge Vaudenay; Better Algorithms for LWE and LWR

  • Dan Boneh; Divya Gupta; Ilya Mironov; Amit Sahai; Hosting Services on an Untrusted Cloud

  • Masayuki Abe; Markulf Kohlweiss; Miyako Ohkubo; Mehdi Tibouchi; Fully Structure-Preserving Signatures and Shrinking Commitments

  • Jens Groth; Markulf Kohlweiss; One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin

  • Vadim Lyubashevsky; Thomas Prest; Quadratic Time; Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices

  • Joe Zimmerman; How to Obfuscate Programs Directly

  • Mohamed Ahmed Abdelraheem; Peter Beelen; Andrey Bogdanov; Elmar Tischhauser; Twisted Polynomials and Forgery Attacks on GCM

  • Gilles Barthe; Sonia Belaid; Francois Dupressoir; Pierre-Alain Fouque; Benjamin Gregoire; Pierre-Yves Strub; Verified Implementations of Higher-Order Masking

  • Jiang Zhang; Zhenfeng Zhang; Jintai Ding; Michael Snook; Özgür Dagdelen; Authenticated Key Exchange from Ideal Lattices

  • Martin Albrecht; Christian Rechberger; Thomas Schneider; Tyge Tiessen; Michael Zohner; Ciphers for MPC and FHE

  • Juan Garay; Aggelos Kiayias; Nikos Leonardos; The Bitcoin Backbone Protocol: Analysis and Applications

  • Melissa Chase; Rafail Ostrovsky; Ivan Visconti; Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World

  • Jie Chen; Romain Gay; Hoeteck Wee; Improved Dual System ABE in Prime-Order Groups via Encodings

  • Yevgeniy Dodis; Chaya Ganesh; Alexander Golovnev; Ari Juels; Thomas Ristenpart; A Formal Treatment of Backdoored Pseudorandom Generators

  • Josep Balasch; Sebastian Faust; Benedikt Gierlichs; Inner Product Masking Revisited

  • Aggelos Kiayias; Thomas Zacharias; Bingsheng Zhang; End-to-End Verifiable Elections in the Standard Model

  • Junghee Cheon; Kyoohyung Han; Changmin Lee; Hansol Ryu; Damien Stehlé; Cryptanalysis of the Multilinear Maps over the Integers

  • Elette Boyle; Niv Gilboa; Yuval Ishai; Function Secret Sharing

© 2014 COSIC, KU Leuven
Sofia photo by Simona Nikova