default search action
34th CRYPTO 2014: Santa Barbara, California, USA
- Juan A. Garay, Rosario Gennaro:
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Lecture Notes in Computer Science 8616, Springer 2014, ISBN 978-3-662-44370-5
Symmetric Encryption and PRFs
- Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway:
Security of Symmetric Encryption against Mass Surveillance. 1-19 - Yuanxi Dai, Jooyoung Lee, Bart Mennink, John P. Steinberger:
The Security of Multiple Encryption in the Ideal Cipher Model. 20-38 - Shan Chen, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John P. Steinberger:
Minimizing the Two-Round Even-Mansour Cipher. 39-56 - Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin:
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). 57-76 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. 77-94
Formal Methods
- Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. 95-112
Hash Functions
- Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact PRF-Security of NMAC and HMAC. 113-130 - Jian Guo, Thomas Peyrin, Yu Sasaki, Lei Wang:
Updates on Generic Attacks against HMAC and NMAC. 131-148 - Itai Dinur, Gaëtan Leurent:
Improved Generic Attacks against Hash-Based MACs and HAIFA. 149-168 - Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi:
Cryptography from Compression Functions: The UCE Bridge to the ROM. 169-187 - Christina Brzuska, Pooya Farshim, Arno Mittelbach:
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources. 188-205
Groups and Maps
- Dan Boneh, Brent Waters, Mark Zhandry:
Low Overhead Broadcast Encryption from Multilinear Maps. 206-223 - Hyung Tae Lee, Jae Hong Seo:
Security Analysis of Multilinear Maps over the Integers. 224-240 - Masayuki Abe, Jens Groth, Miyako Ohkubo, Takeya Tango:
Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups. 241-260 - Gottfried Herold, Julia Hesse, Dennis Hofheinz, Carla Ràfols, Andy Rupp:
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations. 261-279
Lattices
- Hendrik W. Lenstra Jr., Alice Silverberg:
Revisiting the Gentry-Szydlo Algorithm. 280-296 - Jacob Alperin-Sheriff, Chris Peikert:
Faster Bootstrapping with Polynomial Error. 297-314 - San Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld:
Hardness of k-LWE and Applications in Traitor Tracing. 315-334 - Léo Ducas, Daniele Micciancio:
Improved Short Lattice Signatures in the Standard Model. 335-352 - Abhishek Banerjee, Chris Peikert:
New and Improved Key-Homomorphic Pseudorandom Functions. 353-370
Asymmetric Encryption and Signatures
- Dario Catalano, Dario Fiore, Bogdan Warinschi:
Homomorphic Signatures with Efficient Verification for Polynomial Functions. 371-389 - Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi:
Structure-Preserving Signatures from Type II Pairings. 390-407 - Olivier Blazy, Eike Kiltz, Jiaxin Pan:
(Hierarchical) Identity-Based Encryption from Affine Message Authentication. 408-425 - Craig Gentry, Allison B. Lewko, Brent Waters:
Witness Encryption from Instance Independent Assumptions. 426-443
Side Channels and Leakage Resilience I
- Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. 444-461 - Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth:
On the Impossibility of Cryptography with Tamperable Randomness. 462-479
Obfuscation I
- Dan Boneh, Mark Zhandry:
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. 480-499 - Rafael Pass, Karn Seth, Sidharth Telang:
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings. 500-517 - Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. 518-535
FHE
- Rafail Ostrovsky, Anat Paskin-Cherniavsky, Beni Paskin-Cherniavsky:
Maliciously Circuit-Private FHE. 536-553 - Shai Halevi, Victor Shoup:
Algorithms in HElib. 554-571
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.