Sign in
CRYPTO (2)
2013
2016
2020
2023
2013
2023
Keyphrases
Publications
2023
Yuval Ishai
,
Rafail Ostrovsky
,
Akash Shah
Succinct Arguments for RAM Programs via Projection Codes.
CRYPTO (2)
(2023)
Arthur Lazzaretti
,
Charalampos Papamanthou
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH.
CRYPTO (2)
(2023)
Ben Fisch
,
Zeyu Liu
,
Psi Vesely
Orbweaver: Succinct Linear Functional Commitments from Lattices.
CRYPTO (2)
(2023)
Yu Long Chen
,
Wonseok Choi
,
Changmin Lee
Improved Multi-user Security Using the Squared-Ratio Method.
CRYPTO (2)
(2023)
Dennis Hofheinz
,
Julia Kastner
,
Karen Klein
The Power of Undirected Rewindings for Adaptive Security.
CRYPTO (2)
(2023)
Alexander Golovnev
,
Jonathan Lee
,
Srinath T. V. Setty
,
Justin Thaler
,
Riad S. Wahby
Brakedown: Linear-Time and Field-Agnostic SNARKs for R1CS.
CRYPTO (2)
(2023)
Yanyi Liu
,
Rafael Pass
One-Way Functions and the Hardness of (Probabilistic) Time-Bounded Kolmogorov Complexity w.r.t. Samplable Distributions.
CRYPTO (2)
(2023)
Ashrujit Ghoshal
,
Stefano Tessaro
The Query-Complexity of Preprocessing Attacks.
CRYPTO (2)
(2023)
Melissa Chase
,
F. Betül Durak
,
Serge Vaudenay
Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs.
CRYPTO (2)
(2023)
Yevgeniy Dodis
,
Niels Ferguson
,
Eli Goldin
,
Peter Hall
,
Krzysztof Pietrzak
Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance.
CRYPTO (2)
(2023)
Zvika Brakerski
,
Maya Farber Brodsky
,
Yael Tauman Kalai
,
Alex Lombardi
,
Omer Paneth
SNARGs for Monotone Policy Batch NP.
CRYPTO (2)
(2023)
Divesh Aggarwal
,
Eldon Chung
,
Maciej Obremski
Extractors: Low Entropy Requirements Colliding with Non-malleability.
CRYPTO (2)
(2023)
Nir Bitansky
,
Omer Paneth
,
Dana Shamir
,
Tomer Solomon
Non-interactive Universal Arguments.
CRYPTO (2)
(2023)
Alexander Golovnev
,
Siyao Guo
,
Spencer Peters
,
Noah Stephens-Davidowitz
Revisiting Time-Space Tradeoffs for Function Inversion.
CRYPTO (2)
(2023)
Jeffrey Champion
,
David J. Wu
Non-interactive Zero-Knowledge from Non-interactive Batch Arguments.
CRYPTO (2)
(2023)
Brent Waters
,
Daniel Wichs
Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM.
CRYPTO (2)
(2023)
Hanshen Xiao
,
Srinivas Devadas
PAC Privacy: Automatic Privacy Measurement and Control of Data Processing.
CRYPTO (2)
(2023)
Miroslaw Kutylowski
,
Giuseppe Persiano
,
Duong Hieu Phan
,
Moti Yung
,
Marcin Zawada
Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!
CRYPTO (2)
(2023)
Marta Bellés-Muñoz
,
Jorge Jiménez Urroz
,
Javier Silva
Revisiting Cycles of Pairing-Friendly Elliptic Curves.
CRYPTO (2)
(2023)
Valerio Cini
,
Russell W. F. Lai
,
Giulio Malavolta
Lattice-Based Succinct Arguments from Vanishing Polynomials - (Extended Abstract).
CRYPTO (2)
(2023)
Jonathan Bootle
,
Vadim Lyubashevsky
,
Ngoc Khanh Nguyen
,
Alessandro Sorniotti
A Framework for Practical Anonymous Credentials from Lattices.
CRYPTO (2)
(2023)
Quang Dao
,
Yuval Ishai
,
Aayush Jain
,
Huijia Lin
Multi-party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN.
CRYPTO (2)
(2023)
Jonathan Bootle
,
Alessandro Chiesa
,
Katerina Sotiraki
Lattice-Based Succinct Arguments for NP with Polylogarithmic-Time Verification.
CRYPTO (2)
(2023)
Stefan Dziembowski
,
Sebastian Faust
,
Tomasz Lizurej
Individual Cryptography.
CRYPTO (2)
(2023)
Corentin Jeudy
,
Adeline Roux-Langlois
,
Olivier Sanders
Lattice Signature with Efficient Protocols, Application to Anonymous Credentials.
CRYPTO (2)
(2023)
volume 14082, 2023
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II
CRYPTO (2)
14082 (2023)
2022
Ngoc Khanh Nguyen
,
Gregor Seiler
Practical Sublinear Proofs for R1CS from Lattices.
CRYPTO (2)
(2022)
Joël Alwen
,
Daniel Jost
,
Marta Mularczyk
On the Insider Security of MLS.
CRYPTO (2)
(2022)
Prabhanjan Ananth
,
Fatih Kaleoglu
,
Xingjian Li
,
Qipeng Liu
,
Mark Zhandry
On the Feasibility of Unclonable Encryption, and More.
CRYPTO (2)
(2022)
Maxime Bombar
,
Alain Couvreur
,
Thomas Debris-Alazard
On Codes and Learning with Errors over Function Fields.
CRYPTO (2)
(2022)
Rafaël del Pino
,
Shuichi Katsumata
A New Framework for More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling.
CRYPTO (2)
(2022)
Cas Cremers
,
Moni Naor
,
Shahar Paz
,
Eyal Ronen
CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs.
CRYPTO (2)
(2022)
Yuval Ishai
,
Alexis Korb
,
Paul Lou
,
Amit Sahai
Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation.
CRYPTO (2)
(2022)
Per Austrin
,
Hao Chung
,
Kai-Min Chung
,
Shiuan Fu
,
Yao-Ting Lin
,
Mohammad Mahmoody
On the Impossibility of Key Agreements from Quantum Random Oracles.
CRYPTO (2)
(2022)
Jelle Don
,
Serge Fehr
,
Christian Majenz
,
Christian Schaffner
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM.
CRYPTO (2)
(2022)
Rishab Goyal
,
Vinod Vaikuntanathan
Locally Verifiable Signature and Key Aggregation.
CRYPTO (2)
(2022)
Vadim Lyubashevsky
,
Ngoc Khanh Nguyen
,
Maxime Plançon
Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General.
CRYPTO (2)
(2022)
Brent Waters
,
David J. Wu
Batch Arguments for sfNP and More from Standard Bilinear Group Assumptions.
CRYPTO (2)
(2022)
Rupeng Yang
,
Zuoxia Yu
,
Man Ho Au
,
Willy Susilo
Public-Key Watermarking Schemes for Pseudorandom Functions.
CRYPTO (2)
(2022)
Elette Boyle
,
Geoffroy Couteau
,
Niv Gilboa
,
Yuval Ishai
,
Lisa Kohl
,
Nicolas Resch
,
Peter Scholl
Correlated Pseudorandomness from Expand-Accumulate Codes.
CRYPTO (2)
(2022)
Khoa Nguyen
,
Fuchun Guo
,
Willy Susilo
,
Guomin Yang
Multimodal Private Signatures.
CRYPTO (2)
(2022)
Charlotte Hoffmann
,
Pavel Hubácek
,
Chethan Kamath
,
Karen Klein
,
Krzysztof Pietrzak
Practical Statistically-Sound Proofs of Exponentiation in Any Group.
CRYPTO (2)
(2022)
Thomas Espitau
,
Mehdi Tibouchi
,
Alexandre Wallet
,
Yang Yu
Shorter Hash-and-Sign Lattice-Based Signatures.
CRYPTO (2)
(2022)
Matthias Fitzi
,
Aggelos Kiayias
,
Giorgos Panagiotakos
,
Alexander Russell
Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work - A Provably Secure Blockchain Protocol.
CRYPTO (2)
(2022)
Ran Canetti
,
Palak Jain
,
Marika Swanberg
,
Mayank Varia
Universally Composable End-to-End Secure Messaging.
CRYPTO (2)
(2022)
Christian Matt
,
Jesper Buus Nielsen
,
Søren Eller Thomsen
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks.
CRYPTO (2)
(2022)
Martin R. Albrecht
,
Valerio Cini
,
Russell W. F. Lai
,
Giulio Malavolta
,
Sri Aravinda Krishnan Thyagarajan
Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable - (Extended Abstract).
CRYPTO (2)
(2022)
Michel Abdalla
,
Thorsten Eisenhofer
,
Eike Kiltz
,
Sabrina Kunzweiler
,
Doreen Riepel
Password-Authenticated Key Exchange from Group Actions.
CRYPTO (2)
(2022)
Thibauld Feneuil
,
Antoine Joux
,
Matthieu Rivain
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs.
CRYPTO (2)
(2022)
volume 13508, 2022
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part II
CRYPTO (2)
13508 (2022)