default search action
20. PKC 2017: Amsterdam, The Netherlands
- Serge Fehr:
Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10174, Springer 2017, ISBN 978-3-662-54364-1
Cryptanalysis
- Gottfried Herold, Alexander May:
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE. 3-15 - Gottfried Herold, Elena Kirshanova:
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm. 16-40 - Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. 41-58
Protocols
- David Pointcheval, Olivier Sanders, Jacques Traoré:
Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash. 61-90 - Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren:
Asymptotically Tight Bounds for Composing ORAM with PIR. 91-120 - Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi:
Predictable Arguments of Knowledge. 121-150 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Removing Erasures with Explainable Hash Proof Systems. 151-174 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
Scalable Multi-party Private Set-Intersection. 175-203
Encryption Schemes
- Jie Chen, Junqing Gong, Jian Weng:
Tightly Secure IBE Under Constant-Size Master Public Key. 207-231 - Rishab Goyal, Venkata Koppula, Brent Waters:
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. 232-246 - Benoît Libert, Thomas Peters, Chen Qian:
Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts. 247-276
Leakage-Resilient and Non-Malleable Codes
- Antonio Faonio, Jesper Buus Nielsen:
Non-malleable Codes with Split-State Refresh. 279-309 - Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes. 310-332 - Antonio Faonio, Jesper Buus Nielsen:
Fully Leakage-Resilient Codes. 333-358
Number Theory and Diffie-Hellman
- Barak Shani:
On the Bit Security of Elliptic Curve Diffie-Hellman. 361-387 - Taechan Kim, Jinhyuck Jeong:
Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree. 388-408 - Yang Yu, Guangwu Xu, Xiaoyun Wang:
Provably Secure NTRU Instances over Prime Cyclotomic Rings. 409-434 - Jorge L. Villar:
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. 435-464
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.