default search action
36th CRYPTO 2016: Santa Barbara, CA, USA - Part I
- Matthew Robshaw, Jonathan Katz:
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9814, Springer 2016, ISBN 978-3-662-53017-7
Provable Security for Symmetric Cryptography
- Viet Tung Hoang, Stefano Tessaro:
Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security. 3-32 - Thomas Peyrin, Yannick Seurin:
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. 33-63 - Bart Mennink:
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees. 64-94 - Yuanxi Dai, John P. Steinberger:
Indifferentiability of 8-Round Feistel Networks. 95-120 - Benoît Cogliati, Yannick Seurin:
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC. 121-149
Asymmetric Cryptography and Cryptanalysis I
- Martin R. Albrecht, Shi Bai, Léo Ducas:
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes. 153-178 - Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban:
A Practical Cryptanalysis of the Algebraic Eraser. 179-189 - Zvika Brakerski, Renen Perlman:
Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts. 190-213 - Yu Yu, Jiang Zhang:
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN. 214-243
Cryptography in Theory and Practice
- Mihir Bellare, Björn Tackmann:
The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3. 247-276 - Thomas Shrimpton, Martijn Stam, Bogdan Warinschi:
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case. 277-307 - Geoffroy Couteau, Thomas Peters, David Pointcheval:
Encryption Switching Protocols. 308-338
Compromised Systems
- Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. 341-372 - Mihir Bellare, Daniel Kane, Phillip Rogaway:
Big-Key Symmetric Encryption: Resisting Key Exfiltration. 373-402 - Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. 403-432
Symmetric Cryptanalysis
- Achiya Bar-On, Nathan Keller:
A 2^70 Attack on the Full MISTY1. 435-456 - Sébastien Duval, Virginie Lallemand, Yann Rotella:
Cryptanalysis of the FLIP Family of Stream Ciphers. 457-475
Crypto 2016 Award Papers
- Mark Zhandry:
The Magic of ELFs. 479-508 - Elette Boyle, Niv Gilboa, Yuval Ishai:
Breaking the Circuit Size Barrier for Secure Computation Under DDH. 509-539
Algorithmic Number Theory
- Taechan Kim, Razvan Barbulescu:
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case. 543-571 - Craig Costello, Patrick Longa, Michael Naehrig:
Efficient Algorithms for Supersingular Isogeny Diffie-Hellman. 572-601
Symmetric Primitives
- Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-Like SPN Ciphers. 605-624 - Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. 625-653 - Christina Boura, Anne Canteaut:
Another View of the Division Property. 654-682
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.