default search action
40th CRYPTO 2020: Santa Barbara, CA, USA - Part I
- Daniele Micciancio, Thomas Ristenpart:
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12170, Springer 2020, ISBN 978-3-030-56783-5
Security Models
- Joseph Jaeger, Nirvan Tyagi:
Handling Adaptive Compromise for Practical Encryption Schemes. 3-32 - Daniel Jost, Ueli Maurer:
Overcoming Impossibility Results in Composable Security Using Interval-Wise Guarantees. 33-62 - Mark Zhandry, Cong Zhang:
Indifferentiability for Public Key Cryptosystems. 63-93 - Christopher Patton, Thomas Shrimpton:
Quantifying the Security Cost of Migrating Protocols to Practice. 94-124
Symmetric and Real World Cryptography
- Ashrujit Ghoshal, Joseph Jaeger, Stefano Tessaro:
The Memory-Tightness of Authenticated Encryption. 127-156 - Akshima, David Cash, Andrew Drucker, Hoeteck Wee:
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions. 157-186 - Aldo Gunsing, Bart Mennink:
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free. 187-217 - Viet Tung Hoang, Yaobin Shen:
Security Analysis of NIST CTR-DRBG. 218-247 - Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging. 248-277 - Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu:
Universally Composable Relaxed Password Authenticated Key Exchange. 278-307 - Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Anonymous Tokens with Private Metadata Bit. 308-336
Hardware Security and Leakage Resilience
- Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. 339-368 - Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle. 369-400 - Xin Li, Fermi Ma, Willy Quach, Daniel Wichs:
Leakage-Resilient Key Exchange and Two-Seed Extractors. 401-429
Outsourced Encryption
- Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model. 433-463 - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Fast and Secure Updatable Encryption. 464-493 - Tal Moran, Daniel Wichs:
Incompressible Encodings. 494-523
Constructions
- Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:
New Constructions of Hinting PRGs, OWFs with Encryption, and More. 527-558 - Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. 559-589 - Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. 590-620 - Rishab Goyal, Satyanarayana Vusirikala:
Verifiable Registration-Based Encryption. 621-651 - Mark Zhandry:
New Techniques for Traitor Tracing: Size N1/3 and More from Pairings. 652-682
Public Key Cryptography
- Michel Abdalla, Junqing Gong, Hoeteck Wee:
Functional Encryption for Attribute-Weighted Sums from k-Lin. 685-716 - Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. 717-746 - Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval:
Dynamic Decentralized Functional Encryption. 747-775 - Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu:
On Succinct Arguments and Witness Encryption from Groups. 776-806 - Ran Canetti, Sunoo Park, Oxana Poburinnaya:
Fully Deniable Interactive Encryption. 807-835 - Susan Hohenberger, Venkata Koppula, Brent Waters:
Chosen Ciphertext Security from Injective Trapdoor Functions. 836-866
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.