Login / Signup
EUROCRYPT
1982
1992
2002
2016
1982
2016
Keyphrases
Publications
volume 9666, 2016
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II
EUROCRYPT
9666 (2016)
volume 9665, 2016
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I
EUROCRYPT
9665 (2016)
2014
Juan A. Garay
,
Yuval Ishai
,
Ranjit Kumaresan
,
Hoeteck Wee
On the Complexity of UC Commitments.
EUROCRYPT
(2014)
Sanjam Garg
,
Divya Gupta
Efficient Round Optimal Blind Signatures.
EUROCRYPT
(2014)
Morten Dahl
,
Ivan Damgård
Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption.
EUROCRYPT
(2014)
Shan Chen
,
John P. Steinberger
Tight Security Bounds for Key-Alternating Ciphers.
EUROCRYPT
(2014)
Boaz Barak
,
Sanjam Garg
,
Yael Tauman Kalai
,
Omer Paneth
,
Amit Sahai
Protecting Obfuscation against Algebraic Attacks.
EUROCRYPT
(2014)
François Durvaux
,
François-Xavier Standaert
,
Nicolas Veyrat-Charvillon
How to Certify the Leakage of a Chip?
EUROCRYPT
(2014)
Sebastian Faust
,
Pratyay Mukherjee
,
Daniele Venturi
,
Daniel Wichs
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
EUROCRYPT
(2014)
Ben Morris
,
Phillip Rogaway
Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time.
EUROCRYPT
(2014)
Yevgeniy Dodis
,
Krzysztof Pietrzak
,
Daniel Wichs
Key Derivation without Entropy Waste.
EUROCRYPT
(2014)
Alain Couvreur
,
Ayoub Otmani
,
Jean-Pierre Tillich
Polynomial Time Attack on Wild McEliece over Quadratic Extensions.
EUROCRYPT
(2014)
Chanathip Namprempre
,
Phillip Rogaway
,
Thomas Shrimpton
Reconsidering Generic Composition.
EUROCRYPT
(2014)
Adeline Langlois
,
Damien Stehlé
,
Ron Steinfeld
GGHLite: More Efficient Multilinear Maps from Ideal Lattices.
EUROCRYPT
(2014)
Allison B. Lewko
,
Brent Waters
Why Proving HIBE Systems Secure Is Difficult.
EUROCRYPT
(2014)
Melissa Chase
,
Sarah Meiklejohn
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions.
EUROCRYPT
(2014)
Nuttapong Attrapadung
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More.
EUROCRYPT
(2014)
Himanshu Tyagi
,
Shun Watanabe
A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing.
EUROCRYPT
(2014)
Kazuhiko Minematsu
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions.
EUROCRYPT
(2014)
Niv Gilboa
,
Yuval Ishai
Distributed Point Functions and Their Applications.
EUROCRYPT
(2014)
Junzuo Lai
,
Robert H. Deng
,
Shengli Liu
,
Jian Weng
,
Yunlei Zhao
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack.
EUROCRYPT
(2014)
Benoît Libert
,
Thomas Peters
,
Marc Joye
,
Moti Yung
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
EUROCRYPT
(2014)
Ari Juels
,
Thomas Ristenpart
Honey Encryption: Security Beyond the Brute-Force Bound.
EUROCRYPT
(2014)
Dominique Unruh
Revocable Quantum Timed-Release Encryption.
EUROCRYPT
(2014)
Céline Blondeau
,
Kaisa Nyberg
Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities.
EUROCRYPT
(2014)
Jean-Charles Faugère
,
Louise Huot
,
Antoine Joux
,
Guénaël Renault
,
Vanessa Vitse
Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus.
EUROCRYPT
(2014)
Shafi Goldwasser
,
S. Dov Gordon
,
Vipul Goyal
,
Abhishek Jain
,
Jonathan Katz
,
Feng-Hao Liu
,
Amit Sahai
,
Elaine Shi
,
Hong-Sheng Zhou
Multi-input Functional Encryption.
EUROCRYPT
(2014)
Dan Boneh
,
Craig Gentry
,
Sergey Gorbunov
,
Shai Halevi
,
Valeria Nikolaenko
,
Gil Segev
,
Vinod Vaikuntanathan
,
Dhinakaran Vinayagamurthy
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
EUROCRYPT
(2014)
Thomas Peyrin
,
Lei Wang
Generic Universal Forgery Attack on Iterative Hash-Based MACs.
EUROCRYPT
(2014)
Daniel Kraschewski
,
Hemanta K. Maji
,
Manoj Prabhakaran
,
Amit Sahai
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation.
EUROCRYPT
(2014)
Alexandre Duc
,
Stefan Dziembowski
,
Sebastian Faust
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
EUROCRYPT
(2014)
Mihir Bellare
,
Sarah Meiklejohn
,
Susan Thomson
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig.
EUROCRYPT
(2014)
Jean-Sébastien Coron
Higher Order Masking of Look-Up Tables.
EUROCRYPT
(2014)
Craig Costello
,
Hüseyin Hisil
,
Benjamin Smith
Faster Compact Diffie-Hellman: Endomorphisms on the x-line.
EUROCRYPT
(2014)
Arno Mittelbach
Salvaging Indifferentiability in a Multi-stage Setting.
EUROCRYPT
(2014)
Razvan Barbulescu
,
Pierrick Gaudry
,
Antoine Joux
,
Emmanuel Thomé
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
EUROCRYPT
(2014)
David Cash
,
Stefano Tessaro
The Locality of Searchable Symmetric Encryption.
EUROCRYPT
(2014)
Susan Hohenberger
,
Amit Sahai
,
Brent Waters
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation.
EUROCRYPT
(2014)
Craig Gentry
,
Shai Halevi
,
Steve Lu
,
Rafail Ostrovsky
,
Mariana Raykova
,
Daniel Wichs
Garbled RAM Revisited.
EUROCRYPT
(2014)
Arash Afshar
,
Payman Mohassel
,
Benny Pinkas
,
Ben Riva
Non-Interactive Secure Computation Based on Cut-and-Choose.
EUROCRYPT
(2014)
volume 8441, 2014
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings
EUROCRYPT
8441 (2014)
2013
Marc Stevens
New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis.
EUROCRYPT
(2013)
Sanjam Garg
,
Craig Gentry
,
Shai Halevi
Candidate Multilinear Maps from Ideal Lattices.
EUROCRYPT
(2013)
Huijia Lin
,
Stefano Tessaro
Amplification of Chosen-Ciphertext Security.
EUROCRYPT
(2013)
Emmanuel Prouff
,
Matthieu Rivain
Masking against Side-Channel Attacks: A Formal Security Proof.
EUROCRYPT
(2013)
Jooyoung Lee
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption.
EUROCRYPT
(2013)
Tore Kasper Frederiksen
,
Thomas Pelle Jakobsen
,
Jesper Buus Nielsen
,
Peter Sebastian Nordholt
,
Claudio Orlandi
MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions.
EUROCRYPT
(2013)
Payman Mohassel
,
Seyed Saeed Sadeghian
How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation.
EUROCRYPT
(2013)
Marco Tomamichel
,
Serge Fehr
,
Jedrzej Kaniewski
,
Stephanie Wehner
One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games.
EUROCRYPT
(2013)
volume 7881, 2013
Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings
EUROCRYPT
7881 (2013)