default search action
19. PKC 2016: Taipei, Taiwan
- Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang:
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9615, Springer 2016, ISBN 978-3-662-49386-1
Cryptanalysis
- Christophe Petit, Michiel Kosters, Ange Messeng:
Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields. 3-18 - Samuel Neves, Mehdi Tibouchi:
Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models. 19-35 - Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud:
Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. 36-66 - Atsushi Takayasu, Noboru Kunihiro:
How to Generalize RSA Cryptanalyses. 67-97
Leakage-Resilient and Circularly Secure Encryption
- Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou:
Leakage-Resilient Public-Key Encryption from Obfuscation. 101-128 - Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan:
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes. 129-158 - Hoeteck Wee:
KDM-Security via Homomorphic Smooth Projective Hashing. 159-179
Protocols
- Ran Cohen:
Asynchronous Secure Multiparty Computation in Constant Time. 183-207 - Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao:
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE). 208-233 - Jan Camenisch, Manu Drijvers, Anja Lehmann:
Universally Composable Direct Anonymous Attestation. 234-264 - Ran Canetti, Daniel Shahaf, Margarita Vald:
Universally Composable Authentication and Key-Exchange with Global PKI. 265-296 - Luís T. A. N. Brandão:
Very-Efficient Simulatable Flipping of Many Coins into a Well - (and a New Universally-Composable Commitment Scheme). 297-326 - Allison Bishop, Valerio Pastro:
Robust Secret Sharing Schemes Against Local Adversaries. 327-356
Primitives
- Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy:
Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1. 359-385 - Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. 386-416 - Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi:
On Public Key Encryption from Noisy Codewords. 417-446 - Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang:
Indistinguishability Obfuscation with Non-trivial Efficiency. 447-462
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.