default search action
38th EUROCRYPT 2020: Zagreb, Croatia - Part I
- Anne Canteaut, Yuval Ishai:
Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12106, Springer 2020, ISBN 978-3-030-45723-5
Generic Models
- Mihir Bellare, Hannah Davis, Felix Günther:
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability. 3-32 - Ashrujit Ghoshal, Stefano Tessaro:
On the Memory-Tightness of Hashed ElGamal. 33-62 - Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin:
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model. 63-95 - Thomas Agrikola, Dennis Hofheinz, Julia Kastner:
On Instantiating the Algebraic Group Model from Falsifiable Assumptions. 96-126
Secure Computation I
- Juan A. Garay, Aggelos Kiayias, Rafail M. Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas:
Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era. 129-158 - Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas:
Efficient Constructions for Almost-Everywhere Secure Computation. 159-183 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:
The Price of Active Security in Cryptographic Protocols. 184-215 - Andrew Morgan, Rafael Pass, Antigoni Polychroniadou:
Succinct Non-interactive Secure Computation. 216-245
Quantum I
- Akinori Hosoyamada, Yu Sasaki:
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound. 249-279 - Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia:
Implementing Grover Oracles for Quantum Key Search on AES and LowMC. 280-310 - María Naya-Plasencia, André Schrottenloher:
Optimal Merging in Quantum k-xor and k-xor-sum Algorithms. 311-340 - Koen de Boer, Léo Ducas, Serge Fehr:
On the Quantum Complexity of the Continuous Hidden Subgroup Problem. 341-370
Foundations
- Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan:
Formalizing Data Deletion in the Context of the Right to Be Forgotten. 373-402 - Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi:
OptORAMa: Optimal Oblivious RAM. 403-432 - Itai Dinur:
On the Streaming Indistinguishability of a Random Permutation and a Random Function. 433-460
Isogeny-Based Cryptography
- Chris Peikert:
He Gives C-Sieves on the CSIDH. 463-492 - Xavier Bonnetain, André Schrottenloher:
Quantum Security Analysis of CSIDH. 493-522 - Wouter Castryck, Lorenz Panny, Frederik Vercauteren:
Rational Isogenies from Irrational Endomorphisms. 523-548
Lattice-Based Cryptography
- Zvika Brakerski, Nico Döttling:
Hardness of LWE on General Entropic Distributions. 551-575 - Sam Kim:
Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus. 576-607 - Léo Ducas, Steven D. Galbraith, Thomas Prest, Yang Yu:
Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats. 608-637
Symmetric Cryptography II
- Zhenzhen Bao, Chun Guo, Jian Guo, Ling Song:
TNT: How to Tweak a Block Cipher. 641-673 - Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger:
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy. 674-704 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation. 705-735
Secure Computation II
- Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai:
PSI from PaXoS: Fast, Malicious Private Set Intersection. 739-767 - Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs:
Two-Round Oblivious Transfer from CDH or LPN. 768-797 - Badih Ghazi, Pasin Manurangsi, Rasmus Pagh, Ameya Velingker:
Private Aggregation from Fewer Anonymous Messages. 798-827 - Ran Cohen, Juan A. Garay, Vassilis Zikas:
Broadcast-Optimal Two-Round MPC. 828-858
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.