default search action
35th CRYPTO 2015: Santa Barbara, California, USA
- Rosario Gennaro, Matthew Robshaw:
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9215, Springer 2015, ISBN 978-3-662-47988-9
Lattice-Based Cryptography
- Thijs Laarhoven:
Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing. 3-22 - Qian Guo, Thomas Johansson, Paul Stankovski:
Coded-BKW: Solving LWE Using Lattice Codes. 23-42 - Paul Kirchner, Pierre-Alain Fouque:
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. 43-62 - Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably Weak Instances of Ring-LWE. 63-92
Cryptanalytic Insights
- Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. 95-115 - Alex Biryukov, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. 116-140 - Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:
Capacity and Data Complexity in Multidimensional Linear Attack. 141-160 - Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON Block Cipher Family. 161-185
Modes and Constructions
- Benoit Cogliati, Rodolphe Lampe, Yannick Seurin:
Tweaking Even-Mansour Ciphers. 189-208 - Nicky Mouha, Atul Luykx:
Multi-key Security: The Even-Mansour Construction Revisited. 209-223 - Mohammad Hajiabadi, Bruce M. Kapron:
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations. 224-243
Multilinear Maps and IO
- Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. 247-266 - Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps Over the Integers. 267-286 - Kai-Min Chung, Huijia Lin, Rafael Pass:
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation. 287-307 - Prabhanjan Ananth, Abhishek Jain:
Indistinguishability Obfuscation from Compact Functional Encryption. 308-326
Pseudorandomness
- Nico Döttling, Dominique Schröder:
Efficient Pseudorandom Functions via On-the-Fly Adaptation. 329-350 - Brice Minaud, Yannick Seurin:
The Iterated Random Permutation Problem with Applications to Cascade Encryption. 351-367 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC. 368-387 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. 388-409
Block Cipher Cryptanalysis
- Yosuke Todo:
Integral Cryptanalysis on Full MISTY1. 413-432 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. 433-454 - Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-Key Distinguisher on Full PRESENT. 455-474 - Henri Gilbert, Jérôme Plût, Joana Treger:
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes. 475-490
Integrity
- Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár:
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance. 493-517 - Avradip Mandal, Arnab Roy:
Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More. 518-537 - Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations. 538-557
Assumptions
- Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of the Co-ACD Assumption. 561-580 - Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo:
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP. 581-600 - Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak:
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. 601-620
Hash Functions and Stream Cipher Cryptanalysis
- Pierre Karpman, Thomas Peyrin, Marc Stevens:
Practical Free-Start Collision Attacks on 76-step SHA-1. 623-642 - Bin Zhang, Chao Xu, Willi Meier:
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0. 643-662 - Virginie Lallemand, María Naya-Plasencia:
Cryptanalysis of Full Sprout. 663-682 - Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman:
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE. 683-701
Implementations
- Mike Hamburg:
Decaf: Eliminating Cofactors Through Point Compression. 705-723 - Marcel Keller, Emmanuela Orsini, Peter Scholl:
Actively Secure OT Extension with Optimal Overhead. 724-741 - Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Algebraic Decomposition for Probing Security. 742-763 - Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede:
Consolidating Masking Schemes. 764-783
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.