default search action
40th CRYPTO 2020: Santa Barbara, CA, USA - Part III
- Daniele Micciancio, Thomas Ristenpart:
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12172, Springer 2020, ISBN 978-3-030-56876-4
Multi-party Computation
- Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung:
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality. 3-33 - Melissa Chase, Peihan Miao:
Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF. 34-63 - Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat:
Multiparty Generation of an RSA Modulus. 64-93
Secret Sharing
- Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan:
Non-malleability Against Polynomial Tampering. 97-126 - Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi:
Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model. 127-155 - Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan:
Nearly Optimal Robust Secret Sharing Against Rushing Adversaries. 156-185
Cryptanalysis
- Nicholas Carlini, Matthew Jagielski, Ilya Mironov:
Cryptanalytic Extraction of Neural Network Models. 189-218 - Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. 219-248 - Thomas Peyrin, Haoyang Wang:
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers. 249-278 - Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang:
Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme. 279-298 - Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. 299-328 - Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. 329-358 - Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher:
Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light. 359-388 - Daniel Apon, Ray A. Perlner, Angela Robinson, Paolo Santini:
Cryptanalysis of LEDAcrypt. 389-418 - Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX). 419-448
Delay Functions
- Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels:
Order-Fairness for Byzantine Consensus. 451-480 - Lior Rotem, Gil Segev:
Generically Speeding-Up Repeated Squaring Is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions. 481-509
Zero Knowledge
- Thomas Attema, Ronald Cramer:
Compressed $\varSigma $-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics. 513-543 - Itay Berman, Iftach Haitner, Eliad Tsfadia:
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence. 544-573 - Liran Katzir, Clara Shikhelman, Eylon Yogev:
Interactive Proofs for Social Graphs. 574-601 - Jelle Don, Serge Fehr, Christian Majenz:
The Measure-and-Reprogram Technique 2.0: Multi-round Fiat-Shamir and More. 602-631 - Alex Lombardi, Vinod Vaikuntanathan:
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs. 632-651 - Yael Tauman Kalai, Omer Paneth, Lisa Yang:
Delegation with Updatable Unambiguous Proofs and PPAD-Hardness. 652-673 - Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni:
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust. 674-703 - Srinath T. V. Setty:
Spartan: Efficient and General-Purpose zkSNARKs Without Trusted Setup. 704-737 - Zvika Brakerski, Venkata Koppula, Tamer Mour:
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations. 738-767 - Geoffroy Couteau, Dominik Hartmann:
Shorter Non-interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages. 768-798 - Andrea Coladangelo, Thomas Vidick, Tina Zhang:
Non-interactive Zero-Knowledge Arguments for QMA, with Preprocessing. 799-828
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.