default search action
37th EUROCRYPT 2019: Darmstadt, Germany - Part III
- Yuval Ishai, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11478, Springer 2019, ISBN 978-3-030-17658-7
Foundations I
- Mark Zhandry:
On ELFs, Deterministic Encryption, and Correlated-Input Security. 3-32 - Sanjam Garg, Romain Gay, Mohammad Hajiabadi:
New Techniques for Efficient Trapdoor Functions and Applications. 33-63 - Daniele Micciancio:
Symbolic Encryption with Pseudorandom Keys. 64-93
Efficient Secure Computation
- Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, Xiao Wang:
Covert Security with Public Verifiability: Faster, Leaner, and Simpler. 97-121 - Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai:
Efficient Circuit-Based PSI with Linear Communication. 122-153 - Satrajit Ghosh, Tobias Nilges:
An Algebraic Approach to Maliciously Secure Private Set Intersection. 154-185
Quantum II
- Qipeng Liu, Mark Zhandry:
On Finding Quantum Multi-collisions. 189-218 - Dorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath:
On Quantum Advantage in Information Theoretic Single-Server PIR. 219-246 - Andrea Coladangelo, Alex Bredariol Grilo, Stacey Jeffery, Thomas Vidick:
Verifier-on-a-Leash: New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear Resources. 247-277
Signatures I
- Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. 281-311 - Shuichi Katsumata, Shota Yamada:
Group Signatures Without NIZK: From Lattices in the Standard Model. 312-344 - Eduard Hauck, Eike Kiltz, Julian Loss:
A Modular Treatment of Blind Signatures from Identification Schemes. 345-375
Best Paper Awards
- Benjamin Wesolowski:
Efficient Verifiable Delay Functions. 379-407 - Mark Zhandry:
Quantum Lightning Never Strikes the Same State Twice. 408-438
Information-Theoretic Cryptography
- Benny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, Naty Peter:
Secret-Sharing Schemes for General and Uniform Access Structures. 441-471 - Serge Fehr, Chen Yuan:
Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary. 472-499 - Jiaxin Guan, Mark Zhandry:
Simple Schemes in the Bounded Storage Model. 500-524
Cryptanalysis
- Gaëtan Leurent, Thomas Peyrin:
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1. 527-555 - Ting Li, Yao Sun:
Preimage Attacks on Round-Reduced Keccak-224/256 via an Allocating Approach. 556-584 - Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer:
bison Instantiating the Whitened Swap-Or-Not Construction. 585-616
Foundations II
- Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs:
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing. 619-635 - James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry:
New Techniques for Obfuscating Conjunctions. 636-666 - Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev:
Distributional Collision Resistance Beyond One-Way Functions. 667-695
Signatures II
- Itai Dinur, Niv Nadler:
Multi-target Attacks on the Picnic Signature Scheme and Related Protocols. 699-727 - Nicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor:
Durandal: A Rank Metric Based Signature Scheme. 728-758 - Luca De Feo, Steven D. Galbraith:
SeaSign: Compact Isogeny Signatures from Class Group Actions. 759-789
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.