default search action
EUROCRYPT 2016: Vienna, Austria
- Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9665, Springer 2016, ISBN 978-3-662-49889-7 - Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee:
Tightly CCA-Secure Encryption Without Pairings. 1-27 - Huijia Lin:
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes. 28-57 - Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs:
Essentially Optimal Robust Secret Sharing with Maximal Corruptions. 58-86 - Peter Gazi, Stefano Tessaro:
Provably Robust Sponge-Based PRNGs and KDFs. 87-116 - Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam D. Smith:
Reusable Fuzzy Extractors for Low-Entropy Distributions. 117-146 - Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
Provably Weak Instances of Ring-LWE Revisited. 147-167 - Bin Zhang, Lin Jiao, Mingsheng Wang:
Faster Algorithms for Solving LPN. 168-195 - Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis. 196-213 - Tyge Tiessen:
Polytopic Cryptanalysis. 214-239 - François Durvaux, François-Xavier Standaert:
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces. 240-262 - Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves:
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption. 263-293 - Léo Ducas, Damien Stehlé:
Sanitization of FHE Ciphertexts. 294-310 - Pierrick Méaux, Anthony Journault, François-Xavier Standaert, Claude Carlet:
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts. 311-343 - Gaëtan Leurent:
Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning. 344-371 - Alex Biryukov, Léo Perrin, Aleksei Udovenko:
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. 372-402 - Joost Renes, Craig Costello, Lejla Batina:
Complete Addition Formulas for Prime Order Elliptic Curves. 403-428 - Palash Sarkar, Shashank Singh:
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields. 429-458 - Marc Stevens, Pierre Karpman, Thomas Peyrin:
Freestart Collision for Full SHA-1. 459-483 - Itai Dinur:
New Attacks on the Concatenation and XOR Hash Combiners. 484-508 - Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu:
Cryptanalysis of the New CLT Multilinear Map over the Integers. 509-536 - Yupu Hu, Huiwen Jia:
Cryptanalysis of GGH Map. 537-565 - Mihir Bellare, Daniel J. Bernstein, Stefano Tessaro:
Hash-Function Based PRFs: AMAC and Its Multi-User Security. 566-595 - Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda:
On the Influence of Message Length in PMAC's Security Bounds. 596-621 - Martin R. Albrecht, Kenneth G. Paterson:
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. 622-643 - Falko Strenzke:
An Analysis of OpenSSL's Random Number Generator. 644-669 - Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters. 670-698 - Ágnes Kiss, Thomas Schneider:
Valiant's Universal Circuit is Practical. 699-728 - Mihir Bellare, Björn Tackmann:
Nonce-Based Cryptography: Retaining Security When Randomness Fails. 729-757 - Joseph Jaeger, Thomas Ristenpart, Qiang Tang:
Honey Encryption Beyond Message Recovery Security. 758-788 - Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi:
Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator. 789-819 - Daniele Micciancio, Michael Walter:
Practical, Predictable Lattice Basis Reduction. 820-849
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.