Search
International Association for Cryptologic Research
What's new
Archive
Paper awards
Videos
Authors
Coauthors
By year
By venue
All Committees
Most Committees
Report errors
About
Publications of Pkc 2015
Page
Title
3-26
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
27-51
On the Selective Opening Security of Practical Public-Key Encryption Schemes
52-73
How Secure is Deterministic Encryption?
77-100
Divisible E-Cash Made Practical
101-124
Anonymous Transferable E-Cash
127-149
Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem
150-174
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
175-193
A Polynomial-Time Attack on the BBCRS Scheme
194-213
Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case
217-235
Digital Signatures from Strong RSA without Prime Generation
236-255
Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions
256-279
Tightly-Secure Signatures from Chameleon Hash Functions
283-307
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
308-331
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography
332-352
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
355-376
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
377-398
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
401-426
Simpler Efficient Group Signatures from Lattices
427-449
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based
450-473
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model
477-494
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
495-515
Additively Homomorphic UC Commitments with Optimal Amortized Overhead
516-538
Interactive Message-Locked Encryption and Secure Deduplication
539-553
Faster ECC over \mathbb F_2^521-1
557-578
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
579-603
A Tamper and Leakage Resilient von Neumann Architecture
604-626
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
629-649
Adaptive Proofs of Knowledge in the Random Oracle Model
650-670
Making Sigma-Protocols Non-interactive Without Random Oracles
673-698
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q
699-715
Packing Messages and Optimizing Bootstrapping in GSW-FHE
716-730
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
733-751
Simple Functional Encryption Schemes for Inner Products
752-776
Predicate Encryption for Multi-dimensional Range Queries from Lattices
777-798
On the Practical Security of Inner Product Functional Encryption
799-822
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting