default search action
EUROCRYPT 2014: Copenhagen, Denmark
- Phong Q. Nguyen, Elisabeth Oswald:
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings. Lecture Notes in Computer Science 8441, Springer 2014, ISBN 978-3-642-55219-9
Public-Key Cryptanalysis
- Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé:
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic. 1-16 - Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich:
Polynomial Time Attack on Wild McEliece over Quadratic Extensions. 17-39 - Jean-Charles Faugère, Louise Huot, Antoine Joux, Guénaël Renault, Vanessa Vitse:
Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus. 40-57
Identity-Based Encryption
- Allison B. Lewko, Brent Waters:
Why Proving HIBE Systems Secure Is Difficult. 58-76 - Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. 77-92
Key Derivation and Quantum Computing
- Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs:
Key Derivation without Entropy Waste. 93-110 - Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs:
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits. 111-128 - Dominique Unruh:
Revocable Quantum Timed-Release Encryption. 129-146
Secret-Key Analysis and Implementations
- Thomas Peyrin, Lei Wang:
Generic Universal Forgery Attack on Iterative Hash-Based MACs. 147-164 - Céline Blondeau, Kaisa Nyberg:
Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. 165-182 - Craig Costello, Hüseyin Hisil, Benjamin Smith:
Faster Compact Diffie-Hellman: Endomorphisms on the x-line. 183-200
Obfuscation and Multilinear Maps
- Susan Hohenberger, Amit Sahai, Brent Waters:
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation. 201-220 - Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai:
Protecting Obfuscation against Algebraic Attacks. 221-238 - Adeline Langlois, Damien Stehlé, Ron Steinfeld:
GGHLite: More Efficient Multilinear Maps from Ideal Lattices. 239-256
Authenticated Encryption
- Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton:
Reconsidering Generic Composition. 257-274 - Kazuhiko Minematsu:
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions. 275-292
Symmetric Encryption
- Ari Juels, Thomas Ristenpart:
Honey Encryption: Security Beyond the Brute-Force Bound. 293-310 - Ben Morris, Phillip Rogaway:
Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time. 311-326 - Shan Chen, John P. Steinberger:
Tight Security Bounds for Key-Alternating Ciphers. 327-350 - David Cash, Stefano Tessaro:
The Locality of Searchable Symmetric Encryption. 351-368
Multi-party Computation
- Himanshu Tyagi, Shun Watanabe:
A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing. 369-386 - Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva:
Non-Interactive Secure Computation Based on Cut-and-Choose. 387-404 - Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs:
Garbled RAM Revisited. 405-422
Side-Channel Attacks
- Alexandre Duc, Stefan Dziembowski, Sebastian Faust:
Unifying Leakage Models: From Probing Attacks to Noisy Leakage. 423-440 - Jean-Sébastien Coron:
Higher Order Masking of Look-Up Tables. 441-458 - François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon:
How to Certify the Leakage of a Chip? 459-476
Signatures and Public-Key Encryption
- Sanjam Garg, Divya Gupta:
Efficient Round Optimal Blind Signatures. 477-495 - Mihir Bellare, Sarah Meiklejohn, Susan Thomson:
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig. 496-513 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. 514-532
Functional Encryption
- Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits. 533-556 - Nuttapong Attrapadung:
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More. 557-577 - Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou:
Multi-input Functional Encryption. 578-602
Foundations
- Arno Mittelbach:
Salvaging Indifferentiability in a Multi-stage Setting. 603-621 - Melissa Chase, Sarah Meiklejohn:
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions. 622-639 - Niv Gilboa, Yuval Ishai:
Distributed Point Functions and Their Applications. 640-658
Multi-party Computation
- Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation. 659-676 - Juan A. Garay, Yuval Ishai, Ranjit Kumaresan, Hoeteck Wee:
On the Complexity of UC Commitments. 677-694 - Morten Dahl, Ivan Damgård:
Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption. 695-712
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.