Login / Signup
CRYPTO
1981
1991
2001
2012
1981
2012
Keyphrases
Publications
2012
Mihir Bellare
,
Thomas Ristenpart
,
Stefano Tessaro
Multi-instance Security and Its Application to Password-Based Cryptography.
CRYPTO
(2012)
Melissa Chase
,
Ivan Visconti
Secure Database Commitments and Universal Arguments of Quasi Knowledge.
CRYPTO
(2012)
Itai Dinur
,
Orr Dunkelman
,
Nathan Keller
,
Adi Shamir
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
CRYPTO
(2012)
Dana Dachman-Soled
,
Yael Tauman Kalai
Securing Circuits against Constant-Rate Tampering.
CRYPTO
(2012)
Viet Tung Hoang
,
Ben Morris
,
Phillip Rogaway
An Enciphering Scheme Based on a Card Shuffle.
CRYPTO
(2012)
Nir Bitansky
,
Alessandro Chiesa
Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits.
CRYPTO
(2012)
Romain Bardou
,
Riccardo Focardi
,
Yusuke Kawamoto
,
Lorenzo Simionato
,
Graham Steel
,
Joe-Kai Tsay
Efficient Padding Oracle Attacks on Cryptographic Hardware.
CRYPTO
(2012)
John P. Steinberger
,
Xiaoming Sun
,
Zhe Yang
Stam's Conjecture and Threshold Phenomena in Collision Resistance.
CRYPTO
(2012)
Zvika Brakerski
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
CRYPTO
(2012)
Dennis Hofheinz
,
Tibor Jager
Tightly Secure Signatures and Public-Key Encryption.
CRYPTO
(2012)
Jonathan Zittrain
The End of Crypto.
CRYPTO
(2012)
Johannes Gehrke
,
Michael Hay
,
Edward Lui
,
Rafael Pass
Crowd-Blending Privacy.
CRYPTO
(2012)
Feng-Hao Liu
,
Anna Lysyanskaya
Tamper and Leakage Resilience in the Split-State Model.
CRYPTO
(2012)
Aslí Bay
,
Atefeh Mashatan
,
Serge Vaudenay
Resistance against Iterated Attacks by Decorrelation Revisited, .
CRYPTO
(2012)
Tetsu Iwata
,
Keisuke Ohashi
,
Kazuhiko Minematsu
Breaking and Repairing GCM Security Proofs.
CRYPTO
(2012)
Mihir Bellare
,
Stefano Tessaro
,
Alexander Vardy
Semantic Security for the Wiretap Channel.
CRYPTO
(2012)
Allison B. Lewko
,
Brent Waters
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
CRYPTO
(2012)
Mohamed Ahmed Abdelraheem
,
Martin Ågren
,
Peter Beelen
,
Gregor Leander
On the Distribution of Linear Biases: Three Instructive Examples.
CRYPTO
(2012)
Eli Ben-Sasson
,
Serge Fehr
,
Rafail Ostrovsky
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority.
CRYPTO
(2012)
Tibor Jager
,
Florian Kohlar
,
Sven Schäge
,
Jörg Schwenk
On the Security of TLS-DHE in the Standard Model.
CRYPTO
(2012)
Arjen K. Lenstra
,
James P. Hughes
,
Maxime Augier
,
Joppe W. Bos
,
Thorsten Kleinjung
,
Christophe Wachter
Public Keys.
CRYPTO
(2012)
Shweta Agrawal
,
Vipul Goyal
,
Abhishek Jain
,
Manoj Prabhakaran
,
Amit Sahai
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.
CRYPTO
(2012)
Amit Sahai
,
Hakan Seyalioglu
,
Brent Waters
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption.
CRYPTO
(2012)
Sanjam Garg
,
Amit Sahai
Adaptively Secure Multi-Party Computation with Dishonest Majority.
CRYPTO
(2012)
Simon Knellwolf
,
Dmitry Khovratovich
New Preimage Attacks against Reduced SHA-1.
CRYPTO
(2012)
Joël Alwen
,
Jonathan Katz
,
Ueli Maurer
,
Vassilis Zikas
Collusion-Preserving Computation.
CRYPTO
(2012)
Eric Miles
,
Emanuele Viola
Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs.
CRYPTO
(2012)
Mark Zhandry
Secure Identity-Based Encryption in the Quantum Random Oracle Model.
CRYPTO
(2012)
Amos Beimel
,
Oriol Farràs
,
Yuval Mintz
Secret Sharing Schemes for Very Dense Graphs.
CRYPTO
(2012)
Guy N. Rothblum
How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware.
CRYPTO
(2012)
Craig Gentry
,
Shai Halevi
,
Nigel P. Smart
Homomorphic Evaluation of the AES Circuit.
CRYPTO
(2012)
Mike Rosulek
Universal Composability from Essentially Any Trusted Setup.
CRYPTO
(2012)
Sanjam Garg
,
Abishek Kumarasubramanian
,
Rafail Ostrovsky
,
Ivan Visconti
Impossibility Results for Static Input Secure Computation.
CRYPTO
(2012)
Alexandre Duc
,
Dimitar Jetchev
Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves.
CRYPTO
(2012)
Yevgeniy Dodis
,
Thomas Ristenpart
,
John P. Steinberger
,
Stefano Tessaro
To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC.
CRYPTO
(2012)
Huijia Lin
,
Rafael Pass
Black-Box Constructions of Composable Protocols without Set-Up.
CRYPTO
(2012)
Jesper Buus Nielsen
,
Peter Sebastian Nordholt
,
Claudio Orlandi
,
Sai Sheshank Burra
A New Approach to Practical Active-Secure Two-Party Computation.
CRYPTO
(2012)
Mario Berta
,
Omar Fawzi
,
Stephanie Wehner
Quantum to Classical Randomness Extractors.
CRYPTO
(2012)
Mohammad Mahmoody
,
Rafael Pass
The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives.
CRYPTO
(2012)
Goichiro Hanaoka
,
Takahiro Matsuda
,
Jacob C. N. Schuldt
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.
CRYPTO
(2012)
Sergey Gorbunov
,
Vinod Vaikuntanathan
,
Hoeteck Wee
Functional Encryption with Bounded Collusions via Multi-party Computation.
CRYPTO
(2012)
Ivan Damgård
,
Valerio Pastro
,
Nigel P. Smart
,
Sarah Zakarias
Multiparty Computation from Somewhat Homomorphic Encryption.
CRYPTO
(2012)
Will Landecker
,
Thomas Shrimpton
,
R. Seth Terashima
Tweakable Blockciphers with Beyond Birthday-Bound Security.
CRYPTO
(2012)
Mike Rosulek
Must You Know the Code of f to Securely Compute f?
CRYPTO
(2012)
Frédéric Dupuis
,
Jesper Buus Nielsen
,
Louis Salvail
Actively Secure Two-Party Evaluation of Any Quantum Operation.
CRYPTO
(2012)
Bart Mennink
,
Bart Preneel
Hash Functions Based on Three Permutations: A Generic Security Analysis.
CRYPTO
(2012)
Brent Waters
Functional Encryption for Regular Languages.
CRYPTO
(2012)
Yevgeniy Dodis
,
Adriana López-Alt
,
Ilya Mironov
,
Salil P. Vadhan
Differential Privacy with Imperfect Randomness.
CRYPTO
(2012)
Ernie Brickell
Recent Advances and Existing Research Questions in Platform Security.
CRYPTO
(2012)
volume 7417, 2012
Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
CRYPTO
7417 (2012)