default search action
2. Mycrypt 2016: Kuala Lumpur, Malaysia
- Raphael C.-W. Phan, Moti Yung:
Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10311, Springer 2017, ISBN 978-3-319-61272-0
Keynotes
- Xavier Boyen:
The Case For Human Primacy in Cryptography - (Summary from the Keynote Lecture). 3-10 - Neal Koblitz:
Time for a Paradigm Shift in Our Disciplinary Culture? 11-18
Revisiting Tradition
- Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar:
Another Look at Tightness II: Practical Issues in Cryptography. 21-55 - Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow, Anthony Man-Cho So:
Another Look at Anonymous Communication - Security and Modular Constructions. 56-82 - Alfred Menezes, Palash Sarkar, Shashank Singh:
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography. 83-108
Different Paradigms
- Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. 111-126 - Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache:
Honey Encryption for Language - Robbing Shannon to Pay Turing? 127-144 - Michal Kulis, Pawel Lorek, Filip Zagórski:
Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators. 145-167
Cryptofication
- Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:
A Virtual Wiretap Channel for Secure Message Transmission. 171-192 - Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions. 193-211
Malicious Cryptography
- Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices. 215-232 - Herman Galteland, Kristian Gjøsteen:
Malware, Encryption, and Rerandomization - Everything Is Under Attack. 233-251 - Miroslaw Kutylowski, Jacek Cichon, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang:
Protecting Electronic Signatures in Case of Key Leakage. 252-274
Advances in Cryptanalysis
- Subhabrata Samajder, Palash Sarkar:
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations. 277-293 - Marine Minier, Raphael C.-W. Phan:
Tuple Cryptanalysis: Slicing and Fusing Multisets. 294-320 - Emmanuel Volte, Valérie Nachef, Nicolas Marrière:
Improvements of Attacks on Various Feistel Schemes. 321-344
Primitives and Features
- Afonso Arriaga, Vincenzo Iovino, Qiang Tang:
Updatable Functional Encryption. 347-363 - Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer:
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks. 364-388 - Britta Hale, Christopher Carr, Danilo Gligoroski:
CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control. 389-408 - Veronika Kuchta, Olivier Markowitch:
Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices. 409-435 - Atsushi Fujioka:
One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key Generators. 436-460
Cryptanalysis Correspondence
- Herman Galteland, Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking. 463-473 - Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng:
Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme. 474-477
Invited and Insight Papers
- Goichiro Hanaoka:
Towards User-Friendly Cryptography. 481-484 - Claude Crépeau, Nan Yang:
Multi-prover Interactive Proofs: Unsound Foundations. 485-493 - Houda Ferradi, Rémi Géraud, David Naccache:
Human Public-Key Encryption. 494-505 - Nicolas T. Courtois:
Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis. 506-520 - Ryo Nishimaki:
Watermarking Cryptographic Programs. 521-543 - Tyge Tiessen:
From Higher-Order Differentials to Polytopic Cryptyanalysis. 544-552 - Yosuke Todo:
Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree. 553-571
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.