default search action
37th EUROCRYPT 2018: Tel Aviv, Israel - Part I
- Jesper Buus Nielsen, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I. Lecture Notes in Computer Science 10820, Springer 2018, ISBN 978-3-319-78380-2
Foundations
- Daniele Micciancio, Michael Walter:
On the Bit Security of Cryptographic Primitives. 3-28 - Sebastian Berndt, Maciej Liskiewicz:
On the Gold Standard for Security of Universal Steganography. 29-60 - Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Memory Lower Bounds of Reductions Revisited. 61-90 - Ran Canetti, Yilei Chen, Leonid Reyzin, Ron D. Rothblum:
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption. 91-122
Lattices
- Léo Ducas:
Shortest Vector from Lattice Sieving: A Few Dimensions for Free. 125-145 - Miruna Rosca, Damien Stehlé, Alexandre Wallet:
On the Ring-LWE and Polynomial-LWE Problems. 146-173 - Nicholas Genise, Daniele Micciancio:
Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus. 174-203 - Vadim Lyubashevsky, Gregor Seiler:
Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs. 204-224
Random Oracle Model
- Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John P. Steinberger:
Random Oracles and Non-uniformity. 227-258 - Ilan Komargodski, Eylon Yogev:
Another Step Towards Realizing Random Oracles: Non-malleable Point Obfuscation. 259-279 - Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven:
The Wonderful World of Global Random Oracles. 280-312
Fully Homomorphic Encryption
- Hao Chen, Kyoohyung Han:
Homomorphic Lower Digits Removal and Improved FHE Bootstrapping. 315-337 - Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
Homomorphic SIM ^2 D Operations: Single Instruction Much More Data. 338-359 - Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
Bootstrapping for Approximate Homomorphic Encryption. 360-384
Permutations
- Srimanta Bhattacharya, Mridul Nandi:
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the \chi ^2 Method. 387-412 - Itai Dinur:
An Improved Affine Equivalence Algorithm for Random Permutations. 413-442
Galois Counter Mode
- Atul Luykx, Bart Preneel:
Optimal Forgeries Against Polynomial-Based MACs and GCM. 445-467 - Priyanka Bose, Viet Tung Hoang, Stefano Tessaro:
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds. 468-499
Attribute-Based Encryption
- Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee:
Unbounded ABE via Bilinear Entropy Expansion, Revisited. 503-534 - Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan:
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions. 535-564
Secret Sharing
- Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
Towards Breaking the Exponential Barrier for General Secret Sharing. 567-596 - Oriol Farràs, Tarik Kaced, Sebastià Martín Molleví, Carles Padró:
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing. 597-621
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.