default search action
37th CRYPTO 2017: Santa Barbara, CA, USA - Part III
- Jonathan Katz, Hovav Shacham:
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10403, Springer 2017, ISBN 978-3-319-63696-2
Authenticated Encryption
- Tomer Ashur, Orr Dunkelman, Atul Luykx:
Boosting Authenticated Encryption Robustness with Minimal Modifications. 3-33 - Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. 34-65 - Paul Grubbs, Jiahui Lu, Thomas Ristenpart:
Message Franking via Committing Authenticated Encryption. 66-97 - Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. 98-129
Public-Key Encryption
- Romain Gay, Dennis Hofheinz, Lisa Kohl:
Kurosawa-Desmedt Meets Tight Security. 133-160 - Shota Yamada:
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques. 161-193 - Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich:
Identity-Based Encryption from Codes with Rank Metric. 194-224
Stream Ciphers
- Meicheng Liu:
Degree Evaluation of NFSR-Based Cryptosystems. 227-249 - Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. 250-279
Lattice Crypto
- Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
Middle-Product Learning with Errors. 283-297 - Xavier Boyen, Qinyi Li:
All-But-Many Lossy Trapdoor Functions from Lattices and Applications. 298-331 - Benoît Libert, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE. 332-364 - Rafaël del Pino, Vadim Lyubashevsky:
Amortization with Fewer Equations for Proving Knowledge of Small Secrets. 365-394
Leakage and Subversion
- Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud:
Private Multiplication over Finite Fields. 397-426 - Jan Camenisch, Manu Drijvers, Anja Lehmann:
Anonymous Attestation with Subverted TPMs. 427-461 - Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton:
Hedging Public-Key Encryption in the Real World. 462-494
Symmetric-Key Crypto
- Wei Dai, Viet Tung Hoang, Stefano Tessaro:
Information-Theoretic Indistinguishability via the Chi-Squared Method. 497-523 - Yuanxi Dai, Yannick Seurin, John P. Steinberger, Aishwarya Thiruvengadam:
Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient. 524-555 - Bart Mennink, Samuel Neves:
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory. 556-583
Real-World Crypto
- Felix Günther, Sogol Mazaheri:
A Formal Treatment of Multi-key Channels. 587-618 - Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs:
Ratcheted Encryption and Key Exchange: The Security of Messaging. 619-650 - Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson:
PRF-ODH: Relations, Instantiations, and Impossibility Results. 651-681 - Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing. 682-710
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.