default search action
37th EUROCRYPT 2019: Darmstadt, Germany - Part II
- Yuval Ishai, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11477, Springer 2019, ISBN 978-3-030-17655-6
Homomorphic Primitives
- Elette Boyle, Lisa Kohl, Peter Scholl:
Homomorphic Secret Sharing from Lattices Without FHE. 3-33 - Hao Chen, Ilaria Chillotti, Yongsoo Song:
Improved Bootstrapping for Approximate Homomorphic Encryption. 34-54 - Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy:
Minicrypt Primitives with Algebraic Structure and Applications. 55-82
Standards
- Viet Tung Hoang, David Miller, Ni Trieu:
Attacks only Get Better: How to Break FF3 on Large Domains. 85-116 - Nimrod Aviram, Kai Gellert, Tibor Jager:
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT. 117-150 - Joanne Woodage, Dan Shumow:
An Analysis of NIST SP 800-90A. 151-180
Searchable Encryption and ORAM
- Seny Kamara, Tarik Moataz:
Computationally Volume-Hiding Structured Encryption. 183-213 - Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Locality-Preserving Oblivious RAM. 214-243 - Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, Daniel Wichs:
Private Anonymous Data Access. 244-273
Proofs of Work and Space
- Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter:
Reversible Proofs of Sequential Work. 277-291 - Nico Döttling, Russell W. F. Lai, Giulio Malavolta:
Incremental Proofs of Sequential Work. 292-323 - Ben Fisch:
Tight Proofs of Space and Replication. 324-348
Secure Computation
- Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
Founding Secure Computation on Blockchains. 351-380 - Navneet Agarwal, Sanat Anand, Manoj Prabhakaran:
Uncovering Algebraic Structures in the MPC Landscape. 381-406
Quantum I
- Daniel J. Bernstein, Tanja Lange, Chloe Martindale, Lorenz Panny:
Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies. 409-441 - Divesh Aggarwal, Kai-Min Chung, Han-Hsuan Lin, Thomas Vidick:
A Quantum-Proof Non-malleable Extractor - With Application to Privacy Amplification Against Active Quantum Adversaries. 442-469
Secure Computation and NIZK
- Geoffroy Couteau:
A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model. 473-503 - Benny Applebaum, Zvika Brakerski, Rotem Tsabary:
Degree 2 is Complete for the Round-Complexity of Malicious MPC. 504-531 - Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain:
Two Round Information-Theoretic MPC with Malicious Security. 532-561 - Geoffroy Couteau, Dennis Hofheinz:
Designated-Verifier Pseudorandom Generators, and Their Applications. 562-592 - Willy Quach, Ron D. Rothblum, Daniel Wichs:
Reusable Designated-Verifier NIZKs for all NP from CDH. 593-621 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions. 622-651
Lattice-Based Cryptography
- Nicholas Genise, Daniele Micciancio, Yuriy Polyakov:
Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More. 655-684 - Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé:
Approx-SVP in Ideal Lattices with Pre-processing. 685-716 - Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens:
The General Sieve Kernel and New Records in Lattice Reduction. 717-746 - Ciprian Baetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay:
Misuse Attacks on Post-quantum Cryptosystems. 747-776
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.