Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ernie Brickell |
Recent Advances and Existing Research Questions in Platform Security. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Allison B. Lewko, Brent Waters |
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky |
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Alessandro Chiesa |
Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Duc, Dimitar Jetchev |
Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Zittrain |
The End of Crypto. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Melissa Chase, Ivan Visconti |
Secure Database Commitments and Universal Arguments of Quasi Knowledge. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Huijia Lin, Rafael Pass |
Black-Box Constructions of Composable Protocols without Set-Up. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mark Zhandry |
Secure Identity-Based Encryption in the Quantum Random Oracle Model. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Valerio Pastro, Nigel P. Smart, Sarah Zakarias |
Multiparty Computation from Somewhat Homomorphic Encryption. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, Tibor Jager |
Tightly Secure Signatures and Public-Key Encryption. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Feng-Hao Liu, Anna Lysyanskaya |
Tamper and Leakage Resilience in the Split-State Model. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Simon Knellwolf, Dmitry Khovratovich |
New Preimage Attacks against Reduced SHA-1. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra, James P. Hughes 0001, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter |
Public Keys. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sanjam Garg, Amit Sahai |
Adaptively Secure Multi-Party Computation with Dishonest Majority. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Oriol Farràs, Yuval Mintz |
Secret Sharing Schemes for Very Dense Graphs. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dana Dachman-Soled, Yael Tauman Kalai |
Securing Circuits against Constant-Rate Tampering. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Amit Sahai, Hakan Seyalioglu, Brent Waters |
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Will Landecker, Thomas Shrimpton, R. Seth Terashima |
Tweakable Blockciphers with Beyond Birthday-Bound Security. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Takahiro Matsuda 0002, Jacob C. N. Schuldt |
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil P. Vadhan |
Differential Privacy with Imperfect Randomness. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | John P. Steinberger, Xiaoming Sun 0001, Zhe Yang |
Stam's Conjecture and Threshold Phenomena in Collision Resistance. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir |
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Stefano Tessaro, Alexander Vardy |
Semantic Security for the Wiretap Channel. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu |
Breaking and Repairing GCM Security Proofs. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guy N. Rothblum |
How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass |
Crowd-Blending Privacy. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas |
Collusion-Preserving Computation. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Brent Waters |
Functional Encryption for Regular Languages. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Thomas Ristenpart, Stefano Tessaro |
Multi-instance Security and Its Application to Password-Based Cryptography. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mike Rosulek |
Universal Composability from Essentially Any Trusted Setup. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Viet Tung Hoang, Ben Morris, Phillip Rogaway |
An Enciphering Scheme Based on a Card Shuffle. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mario Berta, Omar Fawzi, Stephanie Wehner |
Quantum to Classical Randomness Extractors. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski |
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk |
On the Security of TLS-DHE in the Standard Model. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shweta Agrawal, Vipul Goyal, Abhishek Jain 0002, Manoj Prabhakaran 0001, Amit Sahai |
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bart Mennink, Bart Preneel |
Hash Functions Based on Three Permutations: A Generic Security Analysis. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Mahmoody, Rafael Pass |
The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Romain Bardou, Riccardo Focardi, Yusuke Kawamoto 0001, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay |
Efficient Padding Oracle Attacks on Cryptographic Hardware. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro |
To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra |
A New Approach to Practical Active-Secure Two-Party Computation. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander |
On the Distribution of Linear Biases: Three Instructive Examples. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry, Shai Halevi, Nigel P. Smart |
Homomorphic Evaluation of the AES Circuit. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aslí Bay, Atefeh Mashatan, Serge Vaudenay |
Resistance against Iterated Attacks by Decorrelation Revisited, . |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eric Miles, Emanuele Viola |
Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini, Ran Canetti (eds.) |
Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti |
Impossibility Results for Static Input Secure Computation. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sergey Gorbunov 0001, Vinod Vaikuntanathan, Hoeteck Wee |
Functional Encryption with Bounded Collusions via Multi-party Computation. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail |
Actively Secure Two-Party Evaluation of Any Quantum Operation. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mike Rosulek |
Must You Know the Code of f to Securely Compute f? |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Libert, Thomas Peters, Moti Yung |
Group Signatures with Almost-for-Free Revocation. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Brassard, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante, Louis Salvail |
Merkle Puzzles in a Quantum World. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos |
Optimal Verification of Operations on Dynamic Sets. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Bernstein, Tanja Lange 0001, Christiane Peters |
Smaller Decoding Exponents: Ball-Collision Decoding. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Phillip Rogaway (eds.) |
Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser 0001 |
Physically Uncloneable Functions in the Universal Composition Framework. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | María Naya-Plasencia |
How to Improve Rebound Attacks. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Micciancio, Petros Mol |
Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shai Halevi, Yehuda Lindell, Benny Pinkas |
Secure Computation on the Web: Computing without Simultaneous Interaction. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yael Tauman Kalai, Bhavana Kanukurthi, Amit Sahai |
Cryptography with Tamperable and Leaky Memory. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo |
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner |
Position-Based Quantum Cryptography: Impossibility and Constructions. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jian Guo 0001, Thomas Peyrin, Axel Poschmann |
The PHOTON Family of Lightweight Hash Functions. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner |
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella Béguelin |
Computer-Aided Security Proofs for the Working Cryptographer. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Adam O'Neill, Chris Peikert, Brent Waters |
Bi-Deniable Public-Key Encryption. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Sriram Keelveedhi |
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi |
Fully Homomorphic Encryption over the Integers with Shorter Public Keys. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sanjam Garg, Vanishree Rao, Amit Sahai, Dominique Schröder, Dominique Unruh |
Round Optimal Blind Signatures. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jooyoung Lee 0001, Martijn Stam, John P. Steinberger |
The Collision Security of Tandem-DM in the Ideal Cipher Model. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Carolyn Whitnall, Elisabeth Oswald |
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kan Yasuda |
A New Variant of PMAC: Beyond the Birthday Bound. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jintai Ding, Timothy J. Hodges |
Inverting HFE Systems Is Quasi-Polynomial for All Fields. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Boldyreva, Nathan Chenette, Adam O'Neill |
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Hanrot, Xavier Pujol, Damien Stehlé |
Analyzing Blockwise Lattice Algorithms Using Dynamical Systems. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque |
Automatic Search of Attacks on Round-Reduced AES and Applications. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari |
Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis |
Verifiable Delegation of Computation over Large Datasets. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Yehuda Lindell, Eran Omri, Ilan Orlov |
1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz |
Memory Delegation. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Mahmoody, Tal Moran, Salil P. Vadhan |
Time-Lock Puzzles in the Random Oracle Model. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran 0001, Amit Sahai, Jürg Wullschleger |
Constant-Rate Oblivious Transfer from Noisy Channels. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Roger Dingledine |
Tor and Circumvention: Lessons Learned - (Abstract to Go with Invited Talk). |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Dziembowski, Tomasz Kazana, Daniel Wichs |
Key-Evolution Schemes Resilient to Space-Bounded Leakage. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski, Vinod Vaikuntanathan |
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell, Eli Oxman, Benny Pinkas |
The IPS Compiler: Optimizations, Variants and Concrete Efficiency. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Veyrat-Charvillon, François-Xavier Standaert |
Generic Side-Channel Distinguishers: Improvements and Limitations. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hang Dinh, Cristopher Moore, Alexander Russell |
McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski, Gil Segev 0001 |
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Paul Baecher, Marc Fischlin |
Random Oracle Reducibility. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu 0001 |
Leftover Hash Lemma, Revisited. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sean Hallgren, Adam D. Smith, Fang Song 0001 |
Classical Cryptographic Protocols in a Quantum World. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ignacio Cascudo Pueyo, Ronald Cramer, Chaoping Xing |
The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gilad Asharov, Yehuda Lindell, Tal Rabin |
Perfectly-Secure Multiplication for Any t < n/3. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sanjam Garg, Abhishek Jain 0002, Amit Sahai |
Leakage-Resilient Zero Knowledge. |
CRYPTO |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eike Kiltz, Adam O'Neill, Adam D. Smith |
Instantiability of RSA-OAEP under Chosen-Plaintext Attack. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, David Cash |
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Ran Canetti |
On Strong Simulation and Composable Point Obfuscation. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Krzysztof Pietrzak |
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail |
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|