Year | Title | Venue |

2017 | Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems | pkc |

2017 | Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash | pkc |

2017 | Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree | pkc |

2017 | Access Control Encryption for Equality, Comparison, and More | pkc |

2017 | On the Computational Overhead of MPC with Dishonest Majority | pkc |

2017 | Separating IND-CPA and Circular Security for Unbounded Length Key Cycles | pkc |

2017 | Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation | pkc |

2017 | Improved Algorithms for the Approximate k-List Problem in Euclidean Norm | pkc |

2017 | Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes | pkc |

2017 | On the Bit Security of Elliptic Curve Diffie-Hellman | pkc |

2017 | Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 | pkc |

2017 | Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II | pkc |

2017 | LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE | pkc |

2017 | A Modular Security Analysis of EAP and IEEE 802.11 | pkc |

2017 | Fully Leakage-Resilient Codes | pkc |

2017 | Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I | pkc |

2017 | Removing Erasures with Explainable Hash Proof Systems | pkc |

2017 | Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts | pkc |

2017 | Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures | pkc |

2017 | Asymptotically Tight Bounds for Composing ORAM with PIR | pkc |

2017 | Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures | pkc |

2017 | FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime | pkc |

2017 | Provably Secure NTRU Instances over Prime Cyclotomic Rings | pkc |

2017 | Constraining Pseudorandom Functions Privately | pkc |

2017 | Improved Structure Preserving Signatures Under Standard Bilinear Assumptions | pkc |

2017 | Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits | pkc |

2017 | Predictable Arguments of Knowledge | pkc |

2017 | CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions | pkc |

2017 | Non-malleable Codes with Split-State Refresh | pkc |

2017 | Circuit-Private Multi-key FHE | pkc |

2017 | Scalable Multi-party Private Set-Intersection | pkc |

2017 | Ceremonies for End-to-End Verifiable Elections | pkc |

2017 | Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model | pkc |

2017 | Chosen-Ciphertext Secure Fully Homomorphic Encryption | pkc |

2017 | Better Two-Round Adaptive Multi-party Computation | pkc |

2017 | Tightly Secure IBE Under Constant-Size Master Public Key | pkc |

2017 | Universal Samplers with Fast Verification | pkc |

2017 | Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions | pkc |

2016 | Security Analysis of BLAKE2's Modes of Operation | tosc |

2016 | Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks? | tosc |

2016 | Rotational Cryptanalysis in the Presence of Constants | tosc |

2016 | Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications | tosc |

2016 | Cryptanalysis of Haraka | tosc |

2016 | OleF: an Inverse-Free Online Cipher. An Online SPRP with an Optimal Inverse-Free Construction | tosc |

2016 | Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog | tosc |

2016 | Practical Key-Recovery Attack on MANTIS5 | tosc |

2016 | Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis | tosc |

2016 | Subspace Trail Cryptanalysis and its Applications to AES | tosc |

2016 | Lightweight Diffusion Layer: Importance of Toeplitz Matrices | tosc |

2016 | Quantum Differential and Linear Cryptanalysis | tosc |

2016 | Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs | tosc |

2016 | Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions | tosc |

2016 | Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs | tosc |

2016 | Stronger Security Variants of GCM-SIV | tosc |

2016 | Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models | tosc |

2016 | On Ciphers that Continuously Access the Non-Volatile Key | tosc |

2016 | Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha | tosc |

2016 | Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP | tosc |

2016 | Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes | tosc |

2016 | Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes | tosc |

2016 | The Exact Security of PMAC | tosc |

2017 | Scrypt Is Maximally Memory-Hard | eurocrypt |

2017 | New techniques for trail bounds and application to differential trails in Keccak | tosc |

2017 | SoK: Security Models for Pseudo-Random Number Generators | tosc |

2017 | The Approximate k-List Problem | tosc |

2017 | Conditional Cube Attack on Round-Reduced ASCON | tosc |

2017 | Meet-in-the-Middle Attacks on Reduced-Round Midori64 | tosc |

2017 | Analysis of AES, SKINNY, and Others with Constraint Programming | tosc |

2017 | Cube-like Attack on Round-Reduced Initialization of Ketje Sr | tosc |

2017 | Analysis of Software Countermeasures for Whitebox Encryption | tosc |

2017 | The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes | tosc |

2017 | Optimal Differential Trails in SIMON-like Ciphers | tosc |

2017 | A Fast Single-Key Two-Level Universal Hash Function | tosc |

2017 | On The Exact Security of Message Authentication Using Pseudorandom Functions | tosc |

2017 | LIZARD - A Lightweight Stream Cipher for Power-constrained Devices | tosc |

2017 | Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices | tosc |

2017 | SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3 | tosc |

2017 | Preface | tosc |

2017 | ISAP - Towards Side-Channel Secure Authenticated Encryption | tosc |

2017 | Cryptanalysis of NORX v2.0 | tosc |

2017 | Security Notions for Bidirectional Channels | tosc |

2017 | Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers | tosc |

2017 | Security of Symmetric Primitives under Incorrect Usage of Keys | tosc |

2017 | Cryptanalysis of GOST2 | tosc |

2017 | A Note on 5-bit Quadratic Permutations' Classification | tosc |

2017 | Short Generators Without Quantum Computers: The Case of Multiquadratics | eurocrypt |

2017 | Twisted μ_{4}-Normal Form for Elliptic Curves | eurocrypt |

2017 | Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs | eurocrypt |

2017 | Constraint-Hiding Constrained PRFs for NC^{1} from LWE | eurocrypt |

2017 | Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model | eurocrypt |

2017 | Improved Private Set Intersection Against Malicious Adversaries | eurocrypt |

2017 | Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption | eurocrypt |

2017 | Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation | eurocrypt |

2017 | Small CRT-Exponent RSA Revisited | eurocrypt |

2017 | Formal Abstractions for Attested Execution Secure Processors | eurocrypt |

2017 | Magic Adversaries Versus Individual Reduction: Science Wins Either Way | eurocrypt |

2017 | Hashing Garbled Circuits for Free | eurocrypt |

2017 | 0-RTT Key Exchange with Full Forward Secrecy | eurocrypt |

2017 | Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in L_{|Δ𝕂|}(½) and Application to the Cryptanalysis of a FHE Scheme | eurocrypt |

2017 | Computation of a 768-Bit Prime Field Discrete Logarithm | eurocrypt |