


Остановите войну!
for scientists:


default search action
36. EUROCRYPT 2017: Paris, France - Part II
- Jean-Sébastien Coron, Jesper Buus Nielsen
:
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10211, 2017, ISBN 978-3-319-56613-9
Functional Encryption II
- Nir Bitansky, Huijia Lin, Omer Paneth:
On Removing Graded Encodings from Functional Encryption. 3-29 - Shashank Agrawal, David J. Wu:
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions. 30-61
Lattice Attacks and Constructions IV
- Yoshinori Aono, Phong Q. Nguyen:
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning. 65-102 - Martin R. Albrecht:
On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL. 103-129 - Atsushi Takayasu, Yao Lu, Liqiang Peng:
Small CRT-Exponent RSA Revisited. 130-159
Multiparty Computation II
- Elette Boyle, Niv Gilboa
, Yuval Ishai:
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation. 163-193 - Sanjam Garg, Susumu Kiyoshima, Omkant Pandey:
On the Exact Round Complexity of Self-composable Two-Party Computation. 194-224 - Jun Furukawa, Yehuda Lindell
, Ariel Nof, Or Weinstein:
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority. 225-255
Symmetric Cryptanalysis I
- Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. 259-288 - Lorenzo Grassi
, Christian Rechberger, Sondre Rønjom:
A New Structural-Differential Property of 5-Round AES. 289-317
Zero Knowledge II
- Geoffroy Couteau
, Thomas Peters, David Pointcheval
:
Removing the Strong RSA Assumption from Arguments over the Integers. 321-350 - Yi Deng:
Magic Adversaries Versus Individual Reduction: Science Wins Either Way. 351-377
Provable Security for Symmetric Cryptography I
- Viet Tung Hoang, Stefano Tessaro:
The Multi-user Security of Double Encryption. 381-411 - Pratik Soni, Stefano Tessaro:
Public-Seed Pseudorandom Permutations. 412-441
Security Models I
- Prabhanjan Ananth, Aloni Cohen, Abhishek Jain:
Cryptography with Updates. 445-472 - Yevgeniy Dodis, Siyao Guo, Jonathan Katz:
Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited. 473-495
Provable Security for Symmetric Cryptography II
- Paul Grubbs, Thomas Ristenpart, Yuval Yarom
:
Modifying an Enciphering Scheme After Deployment. 499-527 - Rishab Goyal, Venkata Koppula, Brent Waters:
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption. 528-557
Security Models II
- Mohammad Hajiabadi, Bruce M. Kapron
:
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions. 561-591 - Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. 592-606
Blockchain
- Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra:
Decentralized Anonymous Micropayments. 609-642 - Rafael Pass
, Lior Seeman, Abhi Shelat:
Analysis of the Blockchain Protocol in Asynchronous Networks. 643-673

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.