Login / Signup
EUROCRYPT
1982
1987
1992
1997
2002
2007
2016
1982
2016
Keyphrases
1982
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2016
Publications
volume 9666, 2016
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II
EUROCRYPT
9666 (2016)
2014
Juan A. Garay
,
Yuval Ishai
,
Ranjit Kumaresan
,
Hoeteck Wee
On the Complexity of UC Commitments.
EUROCRYPT
(2014)
Sanjam Garg
,
Divya Gupta
Efficient Round Optimal Blind Signatures.
EUROCRYPT
(2014)
Morten Dahl
,
Ivan Damgård
Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption.
EUROCRYPT
(2014)
Shan Chen
,
John P. Steinberger
Tight Security Bounds for Key-Alternating Ciphers.
EUROCRYPT
(2014)
Boaz Barak
,
Sanjam Garg
,
Yael Tauman Kalai
,
Omer Paneth
,
Amit Sahai
Protecting Obfuscation against Algebraic Attacks.
EUROCRYPT
(2014)
François Durvaux
,
François-Xavier Standaert
,
Nicolas Veyrat-Charvillon
How to Certify the Leakage of a Chip?
EUROCRYPT
(2014)
Sebastian Faust
,
Pratyay Mukherjee
,
Daniele Venturi
,
Daniel Wichs
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
EUROCRYPT
(2014)
Ben Morris
,
Phillip Rogaway
Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time.
EUROCRYPT
(2014)
Yevgeniy Dodis
,
Krzysztof Pietrzak
,
Daniel Wichs
Key Derivation without Entropy Waste.
EUROCRYPT
(2014)
Alain Couvreur
,
Ayoub Otmani
,
Jean-Pierre Tillich
Polynomial Time Attack on Wild McEliece over Quadratic Extensions.
EUROCRYPT
(2014)
Chanathip Namprempre
,
Phillip Rogaway
,
Thomas Shrimpton
Reconsidering Generic Composition.
EUROCRYPT
(2014)
Adeline Langlois
,
Damien Stehlé
,
Ron Steinfeld
GGHLite: More Efficient Multilinear Maps from Ideal Lattices.
EUROCRYPT
(2014)
Allison B. Lewko
,
Brent Waters
Why Proving HIBE Systems Secure Is Difficult.
EUROCRYPT
(2014)
Melissa Chase
,
Sarah Meiklejohn
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions.
EUROCRYPT
(2014)
Nuttapong Attrapadung
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More.
EUROCRYPT
(2014)
Himanshu Tyagi
,
Shun Watanabe
A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing.
EUROCRYPT
(2014)
Kazuhiko Minematsu
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions.
EUROCRYPT
(2014)
Niv Gilboa
,
Yuval Ishai
Distributed Point Functions and Their Applications.
EUROCRYPT
(2014)
Junzuo Lai
,
Robert H. Deng
,
Shengli Liu
,
Jian Weng
,
Yunlei Zhao
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack.
EUROCRYPT
(2014)
Benoît Libert
,
Thomas Peters
,
Marc Joye
,
Moti Yung
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
EUROCRYPT
(2014)
Ari Juels
,
Thomas Ristenpart
Honey Encryption: Security Beyond the Brute-Force Bound.
EUROCRYPT
(2014)
Dominique Unruh
Revocable Quantum Timed-Release Encryption.
EUROCRYPT
(2014)
Céline Blondeau
,
Kaisa Nyberg
Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities.
EUROCRYPT
(2014)
Jean-Charles Faugère
,
Louise Huot
,
Antoine Joux
,
Guénaël Renault
,
Vanessa Vitse
Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus.
EUROCRYPT
(2014)
Shafi Goldwasser
,
S. Dov Gordon
,
Vipul Goyal
,
Abhishek Jain
,
Jonathan Katz
,
Feng-Hao Liu
,
Amit Sahai
,
Elaine Shi
,
Hong-Sheng Zhou
Multi-input Functional Encryption.
EUROCRYPT
(2014)
Dan Boneh
,
Craig Gentry
,
Sergey Gorbunov
,
Shai Halevi
,
Valeria Nikolaenko
,
Gil Segev
,
Vinod Vaikuntanathan
,
Dhinakaran Vinayagamurthy
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
EUROCRYPT
(2014)
Thomas Peyrin
,
Lei Wang
Generic Universal Forgery Attack on Iterative Hash-Based MACs.
EUROCRYPT
(2014)
Daniel Kraschewski
,
Hemanta K. Maji
,
Manoj Prabhakaran
,
Amit Sahai
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation.
EUROCRYPT
(2014)
Alexandre Duc
,
Stefan Dziembowski
,
Sebastian Faust
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
EUROCRYPT
(2014)
Mihir Bellare
,
Sarah Meiklejohn
,
Susan Thomson
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig.
EUROCRYPT
(2014)
Jean-Sébastien Coron
Higher Order Masking of Look-Up Tables.
EUROCRYPT
(2014)
Craig Costello
,
Hüseyin Hisil
,
Benjamin Smith
Faster Compact Diffie-Hellman: Endomorphisms on the x-line.
EUROCRYPT
(2014)
Arno Mittelbach
Salvaging Indifferentiability in a Multi-stage Setting.
EUROCRYPT
(2014)
Razvan Barbulescu
,
Pierrick Gaudry
,
Antoine Joux
,
Emmanuel Thomé
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
EUROCRYPT
(2014)
David Cash
,
Stefano Tessaro
The Locality of Searchable Symmetric Encryption.
EUROCRYPT
(2014)
Susan Hohenberger
,
Amit Sahai
,
Brent Waters
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation.
EUROCRYPT
(2014)
Craig Gentry
,
Shai Halevi
,
Steve Lu
,
Rafail Ostrovsky
,
Mariana Raykova
,
Daniel Wichs
Garbled RAM Revisited.
EUROCRYPT
(2014)
Arash Afshar
,
Payman Mohassel
,
Benny Pinkas
,
Ben Riva
Non-Interactive Secure Computation Based on Cut-and-Choose.
EUROCRYPT
(2014)
2013
Marc Stevens
New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis.
EUROCRYPT
(2013)
Sanjam Garg
,
Craig Gentry
,
Shai Halevi
Candidate Multilinear Maps from Ideal Lattices.
EUROCRYPT
(2013)
Huijia Lin
,
Stefano Tessaro
Amplification of Chosen-Ciphertext Security.
EUROCRYPT
(2013)
Emmanuel Prouff
,
Matthieu Rivain
Masking against Side-Channel Attacks: A Formal Security Proof.
EUROCRYPT
(2013)
Jooyoung Lee
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption.
EUROCRYPT
(2013)
Tore Kasper Frederiksen
,
Thomas Pelle Jakobsen
,
Jesper Buus Nielsen
,
Peter Sebastian Nordholt
,
Claudio Orlandi
MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions.
EUROCRYPT
(2013)
Payman Mohassel
,
Seyed Saeed Sadeghian
How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation.
EUROCRYPT
(2013)
Marco Tomamichel
,
Serge Fehr
,
Jedrzej Kaniewski
,
Stephanie Wehner
One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games.
EUROCRYPT
(2013)