default search action
EUROCRYPT 2012: Cambridge, UK
- David Pointcheval, Thomas Johansson:
Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings. Lecture Notes in Computer Science 7237, Springer 2012, ISBN 978-3-642-29010-7
Invited Talks
- Antoine Joux:
A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract). 1-7 - Alfred Menezes:
Another Look at Provable Security. 8
Index Calculus
- Antoine Joux, Vanessa Vitse:
Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over $\mathbb{F}_{p^6}$. 9-26 - Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault:
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields. 27-44
Symmetric Constructions I
- Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract). 45-62 - Peter Gazi, Stefano Tessaro:
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading. 63-80
Secure Computation
- Adam Groce, Jonathan Katz:
Fair Computation with Rational Players. 81-98 - Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Concurrently Secure Computation in Constant Rounds. 99-116 - Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu:
Identity-Based Encryption Resilient to Continual Auxiliary Leakage. 117-134
Protocols
- Dominique Unruh:
Quantum Proofs of Knowledge. 135-152 - Alessandra Scafuro, Ivan Visconti:
On Round-Optimal Zero Knowledge in the Bare Public-Key Model. 153-171 - Gene S. Kopp, John D. Wiltshire-Gordon:
Robust Coin Flipping. 172-194 - Alfonso Cevallos, Serge Fehr, Rafail Ostrovsky, Yuval Rabani:
Unconditionally-Secure Robust Secret Sharing with Compact Shares. 195-208
Lossy Trapdoor Functions
- Dennis Hofheinz:
All-But-Many Lossy Trapdoor Functions. 209-227 - Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters:
Identity-Based (Lossy) Trapdoor Functions and Applications. 228-245 - Hoeteck Wee:
Dual Projective Hashing and Its Applications - Lossy Trapdoor Functions and More. 246-262
Tools
- Stephanie Bayer, Jens Groth:
Efficient Zero-Knowledge Argument for Correctness of a Shuffle. 263-280 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. 281-300 - Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo:
Group to Group Commitments Do Not Shrink. 301-317 - Allison B. Lewko:
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting. 318-335
Symmetric Constructions II
- Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. 336-354 - Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:
Message Authentication, Revisited. 355-374 - Omkant Pandey, Yannis Rouselakis:
Property Preserving Symmetric Encryption. 375-391
Symmetric Cryptanalysis
- Dmitry Khovratovich, Gaëtan Leurent, Christian Rechberger:
Narrow-Bicliques: Cryptanalysis of Full IDEA. 392-410 - Yu Sasaki:
Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks. 411-427 - Amir Moradi:
Statistical Tools Flavor Side-Channel Collision Attacks. 428-445
Fully Homomorphic Encryption
- Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. 446-464 - Craig Gentry, Shai Halevi, Nigel P. Smart:
Fully Homomorphic Encryption with Polylog Overhead. 465-482 - Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs:
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. 483-501
Asymmetric Cryptanalysis
- Yuanmi Chen, Phong Q. Nguyen:
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers. 502-519 - Anja Becker, Antoine Joux, Alexander May, Alexander Meurer:
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding. 520-536
Efficient Reductions
- Saqib A. Kakvi, Eike Kiltz:
Optimal Security Proofs for Full Domain Hash, Revisited. 537-553 - Yannick Seurin:
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model. 554-571 - Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures from Lossy Identification Schemes. 572-590
Public-Key Schemes
- Tatsuaki Okamoto, Katsuyuki Takashima:
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption. 591-608 - Benoît Libert, Thomas Peters, Moti Yung:
Scalable Group Signatures with Revocation. 609-627 - Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev:
Incremental Deterministic Public-Key Encryption. 628-644
Security Models
- Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek:
Standard Security Does Not Imply Security against Selective-Opening. 645-662 - Susan Hohenberger, Allison B. Lewko, Brent Waters:
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security. 663-681 - Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. 682-699
Lattices
- Daniele Micciancio, Chris Peikert:
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. 700-718 - Abhishek Banerjee, Chris Peikert, Alon Rosen:
Pseudorandom Functions and Lattices. 719-737 - Vadim Lyubashevsky:
Lattice Signatures without Trapdoors. 738-755
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.