default search action
EUROCRYPT 2016: Vienna, Austria
- Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9666, Springer 2016, ISBN 978-3-662-49895-8 - Benoît Libert, San Ling
, Khoa Nguyen
, Huaxiong Wang:
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors. 1-31 - Shota Yamada
:
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters. 32-62 - Michele Ciampi
, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi
, Ivan Visconti:
Online/Offline OR Composition of Sigma Protocols. 63-92 - Susumu Kiyoshima:
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance. 93-123 - Apoorvaa Deshpande, Venkata Koppula, Brent Waters:
Constrained Pseudorandom Functions for Unconstrained Inputs. 124-153 - Yu Yu, John P. Steinberger:
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN. 154-183 - Dakshita Khurana, Hemanta K. Maji, Amit Sahai:
Secure Computation from Elastic Noisy Channels. 184-212 - Dakshita Khurana, Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
All Complete Functionalities are Reversible. 213-242 - Mohammad Mahmoody
, Ameer Mohammed:
On the Power of Hierarchical Identity-Based Encryption. 243-272 - Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
:
On the Impossibility of Tight Cryptographic Reductions. 273-304 - Jens Groth
:
On the Size of Pairing-Based Non-interactive Arguments. 305-326 - Jonathan Bootle
, Andrea Cerulli, Pyrros Chaidos, Jens Groth
, Christophe Petit
:
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting. 327-357 - Joël Alwen, Binyi Chen, Chethan Kamath
, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro:
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model. 358-387 - Ryo Nishimaki, Daniel Wichs, Mark Zhandry
:
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key. 388-419 - Ivan Damgård, Jesper Buus Nielsen
, Rafail Ostrovsky, Adi Rosén:
Unconditionally Secure Computation with Reduced Interaction. 420-447 - Sanjam Garg, Pratyay Mukherjee, Omkant Pandey, Antigoni Polychroniadou:
The Exact Round Complexity of Secure Computation. 448-476 - Serge Fehr, Max Fillinger:
On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments. 477-496 - Dominique Unruh:
Computationally Binding Quantum Commitments. 497-527 - Nicolas Gama, Malika Izabachène, Phong Q. Nguyen, Xiang Xie:
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems. 528-558 - Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev:
Recovering Short Generators of Principal Ideals in Cyclotomic Rings. 559-585 - Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust:
Circuit Compilers with O(1/\log (n)) Leakage Rate. 586-615 - Sonia Belaïd, Fabrice Benhamouda
, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
:
Randomness Complexity of Private Circuits for Multiplication. 616-648 - Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam:
10-Round Feistel is Indifferentiable from an Ideal Cipher. 649-678 - Yevgeniy Dodis, Martijn Stam, John P. Steinberger, Tianren Liu
:
Indifferentiability of Confusion-Diffusion Networks. 679-704 - Aggelos Kiayias, Hong-Sheng Zhou
, Vassilis Zikas:
Fair and Robust Multi-party Computation Using a Global Transaction Ledger. 705-734 - Pratyay Mukherjee, Daniel Wichs:
Two Round Multiparty Computation via Multi-key FHE. 735-763 - Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry
:
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits. 764-791 - Mihir Bellare, Igors Stepanovs, Brent Waters:
New Negative Results on Differing-Inputs Obfuscation. 792-821 - Miguel Ambrona
, Gilles Barthe, Benedikt Schmidt:
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model. 822-851 - Zvika Brakerski, Ilan Komargodski, Gil Segev:
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions. 852-880 - Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin:
Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits. 881-908
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.